aboutsummaryrefslogtreecommitdiffstats
path: root/korean/security
diff options
context:
space:
mode:
authorChangwoo Ryu <cwryu@debian.org>2021-08-14 20:40:01 +0900
committerChangwoo Ryu <cwryu@debian.org>2021-08-15 01:44:31 +0900
commit0edb4489e132de1d19f43025cfbcbed3c5f71a9e (patch)
tree7fff45ce84c063dbb178de2cc8155c0077b55ec9 /korean/security
parent5fe768462f402d14ada3208aad712395ea21e96d (diff)
(ko) Remove the common-phrase-only DSA translations
Remove the old Korean DSA translations which are mostly untranslated. The only translated parts are the common security advisory phrases like, "problem have been fixed in version...", "recommend that you upgrade your package", "For detailed information.. please refer to ...". They are not worth as translations.
Diffstat (limited to 'korean/security')
-rw-r--r--korean/security/2018/dsa-4237.wml143
-rw-r--r--korean/security/2018/dsa-4256.wml163
-rw-r--r--korean/security/2018/dsa-4312.wml34
-rw-r--r--korean/security/2018/dsa-4314.wml19
-rw-r--r--korean/security/2018/dsa-4318.wml20
-rw-r--r--korean/security/2018/dsa-4319.wml22
-rw-r--r--korean/security/2018/dsa-4322.wml23
-rw-r--r--korean/security/2018/dsa-4329.wml21
-rw-r--r--korean/security/2018/dsa-4330.wml92
-rw-r--r--korean/security/2018/dsa-4331.wml38
-rw-r--r--korean/security/2018/dsa-4332.wml37
-rw-r--r--korean/security/2018/dsa-4333.wml20
-rw-r--r--korean/security/2018/dsa-4334.wml21
-rw-r--r--korean/security/2018/dsa-4338.wml23
-rw-r--r--korean/security/2018/dsa-4339.wml21
-rw-r--r--korean/security/2018/dsa-4344.wml18
-rw-r--r--korean/security/2018/dsa-4345.wml52
-rw-r--r--korean/security/2018/dsa-4346.wml22
-rw-r--r--korean/security/2018/dsa-4347.wml45
-rw-r--r--korean/security/2018/dsa-4350.wml21
-rw-r--r--korean/security/2018/dsa-4351.wml20
-rw-r--r--korean/security/2018/dsa-4352.wml139
-rw-r--r--korean/security/2018/dsa-4353.wml23
-rw-r--r--korean/security/2018/dsa-4354.wml20
-rw-r--r--korean/security/2018/dsa-4356.wml19
-rw-r--r--korean/security/2018/dsa-4358.wml20
-rw-r--r--korean/security/2018/dsa-4359.wml21
-rw-r--r--korean/security/2018/dsa-4360.wml22
-rw-r--r--korean/security/2018/dsa-4361.wml20
-rw-r--r--korean/security/2019/dsa-4363.wml19
-rw-r--r--korean/security/2019/dsa-4364.wml20
-rw-r--r--korean/security/2019/dsa-4365.wml19
-rw-r--r--korean/security/2019/dsa-4366.wml18
-rw-r--r--korean/security/2019/dsa-4367.wml26
-rw-r--r--korean/security/2019/dsa-4368.wml19
-rw-r--r--korean/security/2019/dsa-4369.wml44
-rw-r--r--korean/security/2019/dsa-4371.wml191
-rw-r--r--korean/security/2019/dsa-4372.wml19
-rw-r--r--korean/security/2019/dsa-4373.wml45
-rw-r--r--korean/security/2019/dsa-4374.wml20
-rw-r--r--korean/security/2019/dsa-4375.wml20
-rw-r--r--korean/security/2019/dsa-4377.wml24
-rw-r--r--korean/security/2019/dsa-4378.wml20
-rw-r--r--korean/security/2019/dsa-4379.wml21
-rw-r--r--korean/security/2019/dsa-4380.wml22
-rw-r--r--korean/security/2019/dsa-4382.wml21
-rw-r--r--korean/security/2019/dsa-4383.wml19
-rw-r--r--korean/security/2019/dsa-4385.wml28
-rw-r--r--korean/security/2019/dsa-4386.wml41
-rw-r--r--korean/security/2019/dsa-4395.wml152
-rw-r--r--korean/security/2019/dsa-4396.wml39
-rw-r--r--korean/security/2019/dsa-4406.wml19
-rw-r--r--korean/security/2019/dsa-4421.wml89
-rw-r--r--korean/security/2019/dsa-4422.wml63
-rw-r--r--korean/security/2019/dsa-4424.wml22
-rw-r--r--korean/security/2019/dsa-4427.wml20
-rw-r--r--korean/security/2019/dsa-4428.wml22
-rw-r--r--korean/security/2019/dsa-4430.wml70
-rw-r--r--korean/security/2019/dsa-4432.wml19
-rw-r--r--korean/security/2019/dsa-4433.wml20
-rw-r--r--korean/security/2019/dsa-4434.wml19
-rw-r--r--korean/security/2019/dsa-4435.wml19
-rw-r--r--korean/security/2019/dsa-4436.wml19
-rw-r--r--korean/security/2019/dsa-4438.wml18
-rw-r--r--korean/security/2019/dsa-4439.wml22
-rw-r--r--korean/security/2019/dsa-4440.wml35
-rw-r--r--korean/security/2019/dsa-4441.wml20
-rw-r--r--korean/security/2019/dsa-4443.wml23
-rw-r--r--korean/security/2019/dsa-4444.wml37
-rw-r--r--korean/security/2019/dsa-4454.wml23
-rw-r--r--korean/security/2019/dsa-4455.wml34
-rw-r--r--korean/security/2019/dsa-4457.wml21
-rw-r--r--korean/security/2019/dsa-4458.wml19
-rw-r--r--korean/security/2019/dsa-4462.wml27
-rw-r--r--korean/security/2019/dsa-4463.wml18
-rw-r--r--korean/security/2019/dsa-4464.wml18
-rw-r--r--korean/security/2019/dsa-4466.wml19
-rw-r--r--korean/security/2019/dsa-4467.wml25
-rw-r--r--korean/security/2019/dsa-4468.wml19
-rw-r--r--korean/security/2019/dsa-4472.wml18
-rw-r--r--korean/security/2019/dsa-4473.wml18
-rw-r--r--korean/security/2019/dsa-4474.wml19
-rw-r--r--korean/security/2019/dsa-4475.wml22
-rw-r--r--korean/security/2019/dsa-4476.wml20
-rw-r--r--korean/security/2019/dsa-4477.wml23
-rw-r--r--korean/security/2019/dsa-4481.wml21
-rw-r--r--korean/security/2019/dsa-4484.wml22
-rw-r--r--korean/security/2019/dsa-4490.wml37
-rw-r--r--korean/security/2019/dsa-4494.wml24
-rw-r--r--korean/security/2019/dsa-4499.wml22
-rw-r--r--korean/security/2019/dsa-4500.wml246
-rw-r--r--korean/security/2019/dsa-4509.wml58
-rw-r--r--korean/security/2019/dsa-4510.wml23
-rw-r--r--korean/security/2019/dsa-4517.wml21
-rw-r--r--korean/security/2019/dsa-4519.wml22
-rw-r--r--korean/security/2019/dsa-4521.wml21
-rw-r--r--korean/security/2019/dsa-4525.wml24
-rw-r--r--korean/security/2019/dsa-4526.wml19
-rw-r--r--korean/security/2019/dsa-4527.wml20
-rw-r--r--korean/security/2019/dsa-4528.wml25
-rw-r--r--korean/security/2019/dsa-4529.wml20
-rw-r--r--korean/security/2019/dsa-4530.wml23
-rw-r--r--korean/security/2019/dsa-4532.wml24
-rw-r--r--korean/security/2019/dsa-4533.wml18
-rw-r--r--korean/security/2019/dsa-4534.wml20
-rw-r--r--korean/security/2019/dsa-4537.wml21
-rw-r--r--korean/security/2019/dsa-4538.wml39
-rw-r--r--korean/security/2019/dsa-4539.wml25
-rw-r--r--korean/security/2019/dsa-4540.wml20
-rw-r--r--korean/security/2019/dsa-4541.wml22
-rw-r--r--korean/security/2019/dsa-4542.wml24
-rw-r--r--korean/security/2019/dsa-4543.wml28
-rw-r--r--korean/security/2019/dsa-4544.wml20
-rw-r--r--korean/security/2019/dsa-4545.wml23
-rw-r--r--korean/security/2019/dsa-4546.wml20
-rw-r--r--korean/security/2019/dsa-4549.wml29
-rw-r--r--korean/security/2019/dsa-4550.wml24
-rw-r--r--korean/security/2019/dsa-4551.wml19
-rw-r--r--korean/security/2019/dsa-4552.wml20
-rw-r--r--korean/security/2019/dsa-4553.wml20
-rw-r--r--korean/security/2019/dsa-4554.wml23
-rw-r--r--korean/security/2019/dsa-4555.wml24
-rw-r--r--korean/security/2019/dsa-4556.wml21
-rw-r--r--korean/security/2019/dsa-4557.wml24
-rw-r--r--korean/security/2019/dsa-4558.wml41
-rw-r--r--korean/security/2019/dsa-4559.wml22
-rw-r--r--korean/security/2019/dsa-4560.wml22
-rw-r--r--korean/security/2019/dsa-4561.wml21
-rw-r--r--korean/security/2019/dsa-4562.wml305
-rw-r--r--korean/security/2019/dsa-4565.wml26
-rw-r--r--korean/security/2019/dsa-4566.wml22
-rw-r--r--korean/security/2019/dsa-4567.wml24
-rw-r--r--korean/security/2019/dsa-4568.wml24
-rw-r--r--korean/security/2019/dsa-4569.wml24
-rw-r--r--korean/security/2019/dsa-4570.wml22
-rw-r--r--korean/security/2019/dsa-4571.wml28
-rw-r--r--korean/security/2019/dsa-4572.wml22
-rw-r--r--korean/security/2019/dsa-4573.wml24
-rw-r--r--korean/security/2019/dsa-4574.wml20
-rw-r--r--korean/security/2019/dsa-4575.wml34
-rw-r--r--korean/security/2019/dsa-4576.wml21
-rw-r--r--korean/security/2019/dsa-4578.wml23
-rw-r--r--korean/security/2019/dsa-4581.wml48
-rw-r--r--korean/security/2019/dsa-4583.wml21
-rw-r--r--korean/security/2019/dsa-4584.wml37
-rw-r--r--korean/security/2019/dsa-4585.wml22
-rw-r--r--korean/security/2019/dsa-4588.wml25
-rw-r--r--korean/security/2019/dsa-4589.wml24
-rw-r--r--korean/security/2019/dsa-4590.wml22
-rw-r--r--korean/security/2019/dsa-4591.wml23
-rw-r--r--korean/security/2019/dsa-4593.wml38
-rw-r--r--korean/security/2019/dsa-4594.wml19
-rw-r--r--korean/security/2019/dsa-4595.wml27
-rw-r--r--korean/security/2019/dsa-4596.wml22
-rw-r--r--korean/security/2020/dsa-4597.wml21
-rw-r--r--korean/security/2020/dsa-4598.wml27
-rw-r--r--korean/security/2020/dsa-4599.wml21
-rw-r--r--korean/security/2020/dsa-4601.wml22
-rw-r--r--korean/security/2020/dsa-4602.wml30
-rw-r--r--korean/security/2020/dsa-4603.wml5
-rw-r--r--korean/security/2020/dsa-4604.wml49
-rw-r--r--korean/security/2020/dsa-4605.wml21
-rw-r--r--korean/security/2020/dsa-4606.wml205
-rw-r--r--korean/security/2020/dsa-4607.wml25
-rw-r--r--korean/security/2020/dsa-4608.wml19
-rw-r--r--korean/security/2020/dsa-4609.wml23
-rw-r--r--korean/security/2020/dsa-4612.wml23
-rw-r--r--korean/security/2020/dsa-4613.wml23
-rw-r--r--korean/security/2020/dsa-4614.wml28
-rw-r--r--korean/security/2020/dsa-4615.wml24
-rw-r--r--korean/security/2020/dsa-4616.wml24
-rw-r--r--korean/security/2020/dsa-4617.wml23
-rw-r--r--korean/security/2020/dsa-4618.wml23
-rw-r--r--korean/security/2020/dsa-4619.wml28
-rw-r--r--korean/security/2020/dsa-4620.wml23
-rw-r--r--korean/security/2020/dsa-4621.wml21
-rw-r--r--korean/security/2020/dsa-4622.wml20
-rw-r--r--korean/security/2020/dsa-4623.wml19
-rw-r--r--korean/security/2020/dsa-4624.wml44
-rw-r--r--korean/security/2020/dsa-4626.wml20
-rw-r--r--korean/security/2020/dsa-4627.wml48
-rw-r--r--korean/security/2020/dsa-4628.wml21
-rw-r--r--korean/security/2020/dsa-4629.wml24
-rw-r--r--korean/security/2020/dsa-4630.wml23
-rw-r--r--korean/security/2020/dsa-4631.wml24
-rw-r--r--korean/security/2020/dsa-4632.wml24
-rw-r--r--korean/security/2020/dsa-4633.wml41
-rw-r--r--korean/security/2020/dsa-4634.wml23
-rw-r--r--korean/security/2020/dsa-4635.wml24
-rw-r--r--korean/security/2020/dsa-4636.wml19
-rw-r--r--korean/security/2020/dsa-4637.wml27
-rw-r--r--korean/security/2020/dsa-4638.wml204
-rw-r--r--korean/security/2020/dsa-4640.wml24
193 files changed, 2 insertions, 6449 deletions
diff --git a/korean/security/2018/dsa-4237.wml b/korean/security/2018/dsa-4237.wml
deleted file mode 100644
index da4ddff3223..00000000000
--- a/korean/security/2018/dsa-4237.wml
+++ /dev/null
@@ -1,143 +0,0 @@
-#use wml::debian::translation-check translation="38064b8fd0bc72aee5667310770c1e8a7cc78720" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>chromium web browser에서 여러 취약점이 발견되었습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6118">CVE-2018-6118</a>
-
- <p>Ned Williamson discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6120">CVE-2018-6120</a>
-
- <p>Zhou Aiting discovered a buffer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6121">CVE-2018-6121</a>
-
- <p>It was discovered that malicious extensions could escalate privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6122">CVE-2018-6122</a>
-
- <p>A type confusion issue was discovered in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6123">CVE-2018-6123</a>
-
- <p>Looben Yang discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6124">CVE-2018-6124</a>
-
- <p>Guang Gong discovered a type confusion issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6125">CVE-2018-6125</a>
-
- <p>Yubico discovered that the WebUSB implementation was too permissive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6126">CVE-2018-6126</a>
-
- <p>Ivan Fratric discovered a buffer overflow issue in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6127">CVE-2018-6127</a>
-
- <p>Looben Yang discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6129">CVE-2018-6129</a>
-
- <p>Natalie Silvanovich discovered an out-of-bounds read issue in WebRTC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6130">CVE-2018-6130</a>
-
- <p>Natalie Silvanovich discovered an out-of-bounds read issue in WebRTC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6131">CVE-2018-6131</a>
-
- <p>Natalie Silvanovich discovered an error in WebAssembly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6132">CVE-2018-6132</a>
-
- <p>Ronald E. Crane discovered an uninitialized memory issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6133">CVE-2018-6133</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6134">CVE-2018-6134</a>
-
- <p>Jun Kokatsu discovered a way to bypass the Referrer Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6135">CVE-2018-6135</a>
-
- <p>Jasper Rebane discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6136">CVE-2018-6136</a>
-
- <p>Peter Wong discovered an out-of-bounds read issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6137">CVE-2018-6137</a>
-
- <p>Michael Smith discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6138">CVE-2018-6138</a>
-
- <p>François Lajeunesse-Robert discovered that the extensions policy was
- too permissive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6139">CVE-2018-6139</a>
-
- <p>Rob Wu discovered a way to bypass restrictions in the debugger extension.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6140">CVE-2018-6140</a>
-
- <p>Rob Wu discovered a way to bypass restrictions in the debugger extension.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6141">CVE-2018-6141</a>
-
- <p>Yangkang discovered a buffer overflow issue in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6142">CVE-2018-6142</a>
-
- <p>Choongwoo Han discovered an out-of-bounds read in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6143">CVE-2018-6143</a>
-
- <p>Guang Gong discovered an out-of-bounds read in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6144">CVE-2018-6144</a>
-
- <p>pdknsk discovered an out-of-bounds read in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6145">CVE-2018-6145</a>
-
- <p>Masato Kinugawa discovered an error in the MathML implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6147">CVE-2018-6147</a>
-
- <p>Michail Pishchagin discovered an error in password entry fields.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6148">CVE-2018-6148</a>
-
- <p>Michał Bentkowski discovered that the Content Security Policy header
- was handled incorrectly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6149">CVE-2018-6149</a>
-
- <p>Yu Zhou and Jundong Xie discovered an out-of-bounds write issue in the
- v8 javascript library.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제는 버전
-버전 67.0.3396.87-1~deb9u1에서 수정되었습니다.</p>
-
-<p>chromium-browser 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium-browser 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium-browser">\
-https://security-tracker.debian.org/tracker/chromium-browser</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4237.data"
diff --git a/korean/security/2018/dsa-4256.wml b/korean/security/2018/dsa-4256.wml
deleted file mode 100644
index 37bffd2fe02..00000000000
--- a/korean/security/2018/dsa-4256.wml
+++ /dev/null
@@ -1,163 +0,0 @@
-#use wml::debian::translation-check translation="7a643f3f84873f2bbfa6b6f02ffdfd6c854ad652" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 크롬 웹 브라우저에서 발견했습니다.
-</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4117">CVE-2018-4117</a>
-
- <p>AhsanEjaz discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6044">CVE-2018-6044</a>
-
- <p>Rob Wu discovered a way to escalate privileges using extensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6150">CVE-2018-6150</a>
-
- <p>Rob Wu discovered an information disclosure issue (this problem was
- fixed in a previous release but was mistakenly omitted from upstream's
- announcement at the time).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6151">CVE-2018-6151</a>
-
- <p>Rob Wu discovered an issue in the developer tools (this problem was
- fixed in a previous release but was mistakenly omitted from upstream's
- announcement at the time).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6152">CVE-2018-6152</a>
-
- <p>Rob Wu discovered an issue in the developer tools (this problem was
- fixed in a previous release but was mistakenly omitted from upstream's
- announcement at the time).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6153">CVE-2018-6153</a>
-
- <p>Zhen Zhou discovered a buffer overflow issue in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6154">CVE-2018-6154</a>
-
- <p>Omair discovered a buffer overflow issue in the WebGL implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6155">CVE-2018-6155</a>
-
- <p>Natalie Silvanovich discovered a use-after-free issue in the WebRTC
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6156">CVE-2018-6156</a>
-
- <p>Natalie Silvanovich discovered a buffer overflow issue in the WebRTC
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6157">CVE-2018-6157</a>
-
- <p>Natalie Silvanovich discovered a type confusion issue in the WebRTC
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6158">CVE-2018-6158</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6159">CVE-2018-6159</a>
-
- <p>Jun Kokatsu discovered a way to bypass the same origin policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6161">CVE-2018-6161</a>
-
- <p>Jun Kokatsu discovered a way to bypass the same origin policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6162">CVE-2018-6162</a>
-
- <p>Omair discovered a buffer overflow issue in the WebGL implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6163">CVE-2018-6163</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6164">CVE-2018-6164</a>
-
- <p>Jun Kokatsu discovered a way to bypass the same origin policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6165">CVE-2018-6165</a>
-
- <p>evil1m0 discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6166">CVE-2018-6166</a>
-
- <p>Lynas Zhang discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6167">CVE-2018-6167</a>
-
- <p>Lynas Zhang discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6168">CVE-2018-6168</a>
-
- <p>Gunes Acar and Danny Y. Huang discovered a way to bypass the Cross
- Origin Resource Sharing policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6169">CVE-2018-6169</a>
-
- <p>Sam P discovered a way to bypass permissions when installing
- extensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6170">CVE-2018-6170</a>
-
- <p>A type confusion issue was discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6171">CVE-2018-6171</a>
-
- <p>A use-after-free issue was discovered in the WebBluetooth
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6172">CVE-2018-6172</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6173">CVE-2018-6173</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6174">CVE-2018-6174</a>
-
- <p>Mark Brand discovered an integer overflow issue in the swiftshader
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6175">CVE-2018-6175</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6176">CVE-2018-6176</a>
-
- <p>Jann Horn discovered a way to escalate privileges using extensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6177">CVE-2018-6177</a>
-
- <p>Ron Masas discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6178">CVE-2018-6178</a>
-
- <p>Khalil Zhani discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6179">CVE-2018-6179</a>
-
- <p>It was discovered that information about files local to the system
- could be leaked to extensions.</p>
-
-<p>This version also fixes a regression introduced in the previous security
-update that could prevent decoding of particular audio/video codecs.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제는 버전 68.0.3440.75-1~deb9u1에서 수정했습니다.</p>
-
-<p>chromium-browser 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>크롬 웹 브라우저에 대한 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium-browser">\
-https://security-tracker.debian.org/tracker/chromium-browser</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4256.data"
diff --git a/korean/security/2018/dsa-4312.wml b/korean/security/2018/dsa-4312.wml
deleted file mode 100644
index 7606e08b619..00000000000
--- a/korean/security/2018/dsa-4312.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-#use wml::debian::translation-check translation="363d45e1c65ff9f20020695e9e1640af3ef72620" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in tinc, a Virtual Private
-Network (VPN) daemon. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16738">CVE-2018-16738</a>
-
- <p>Michael Yonli discovered a flaw in the implementation of the
- authentication protocol that could allow a remote attacker to
- establish an authenticated, one-way connection with another node.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16758">CVE-2018-16758</a>
-
- <p>Michael Yonli discovered that a man-in-the-middle that has
- intercepted a TCP connection might be able to disable encryption of
- UDP packets sent by a node.</p></li>
-
-</ul>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 version 1.0.31-1+deb9u1에서 수정했습니다.</p>
-
-<p>tinc 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>tinc의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/tinc">https://security-tracker.debian.org/tracker/tinc</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4312.data"
diff --git a/korean/security/2018/dsa-4314.wml b/korean/security/2018/dsa-4314.wml
deleted file mode 100644
index 51396775399..00000000000
--- a/korean/security/2018/dsa-4314.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="704754ce9669f557cbd27b4a6e6d7de43b6bad5e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Magnus Klaaborg Stubman discovered a NULL pointer dereference bug in
-net-snmp, a suite of Simple Network Management Protocol applications,
-allowing a remote, authenticated attacker to crash the snmpd process
-(causing a denial of service).</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 5.7.3+dfsg-1.7+deb9u1 버전에서 수정했습니다.</p>
-
-<p>net-snmp 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>net-snmp의 자세한 보안 상태는 보안 추적 페이지를 보세요:
-<a href="https://security-tracker.debian.org/tracker/net-snmp">https://security-tracker.debian.org/tracker/net-snmp</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4314.data"
diff --git a/korean/security/2018/dsa-4318.wml b/korean/security/2018/dsa-4318.wml
deleted file mode 100644
index 262ed5c828c..00000000000
--- a/korean/security/2018/dsa-4318.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="c3120657a7e8583ccb92f2cfcb1b0e9f6ca62377" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Nitin Venkatesh discovered a cross-site scripting vulnerability in moin,
-a Python clone of WikiWiki. A remote attacker can conduct cross-site
-scripting attacks via the GUI editor's link dialogue. This only affects
-installations which have set up fckeditor (not enabled by default).</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 1.9.9-1+deb9u1.</p>
-
-<p>moin 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>moin의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/moin">https://security-tracker.debian.org/tracker/moin</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4318.data"
diff --git a/korean/security/2018/dsa-4319.wml b/korean/security/2018/dsa-4319.wml
deleted file mode 100644
index a5b65b6576f..00000000000
--- a/korean/security/2018/dsa-4319.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="ed2119a35159cb709a44e5bea4b898b68d1c2438" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Frediano Ziglio reported a missing check in the script to generate
-demarshalling code in the SPICE protocol client and server library. The
-generated demarshalling code is prone to multiple buffer overflows. An
-authenticated attacker can take advantage of this flaw to cause a denial
-of service (spice server crash), or possibly, execute arbitrary code.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 0.12.8-2.1+deb9u2.</p>
-
-<p>spice 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of spice please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spice">https://security-tracker.debian.org/tracker/spice</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4319.data"
diff --git a/korean/security/2018/dsa-4322.wml b/korean/security/2018/dsa-4322.wml
deleted file mode 100644
index 54a5d42d4d4..00000000000
--- a/korean/security/2018/dsa-4322.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="b04c964cd714f32ee57d7fa636b7bca8daeb51ff" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Peter Winter-Smith of NCC Group discovered that libssh, a tiny C SSH
-library, contains an authentication bypass vulnerability in the server
-code. An attacker can take advantage of this flaw to successfully
-authenticate without any credentials by presenting the server an
-SSH2_MSG_USERAUTH_SUCCESS message in place of the
-SSH2_MSG_USERAUTH_REQUEST message which the server would expect to
-initiate authentication.</p>
-
-<p>안정 배포(stretch)에서 이 문제를 0.7.3-2+deb9u1 버전에서 수정했습니다.</p>
-
-<p>libssh 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libssh의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libssh">\
-https://security-tracker.debian.org/tracker/libssh</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4322.data"
diff --git a/korean/security/2018/dsa-4329.wml b/korean/security/2018/dsa-4329.wml
deleted file mode 100644
index d6df2d5a0da..00000000000
--- a/korean/security/2018/dsa-4329.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="5c44523d6b6b4de947b94c71e9e075b442656fe5" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that incorrect connection setup in the server for
-Teeworlds, an online multi-player platform 2D shooter, could result in
-denial of service via forged connection packets (rendering all game
-server slots occupied).</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 0.6.5+dfsg-1~deb9u1.</p>
-
-<p>teeworlds 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>teeworlds의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/teeworlds">\
-https://security-tracker.debian.org/tracker/teeworlds</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4329.data"
diff --git a/korean/security/2018/dsa-4330.wml b/korean/security/2018/dsa-4330.wml
deleted file mode 100644
index 80f243c4521..00000000000
--- a/korean/security/2018/dsa-4330.wml
+++ /dev/null
@@ -1,92 +0,0 @@
-#use wml::debian::translation-check translation="56baa1aa5fad724cf89ddd056dfeb02216ffb096" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>chromium 웹 브라우저에서 여러 취약점을 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5179">CVE-2018-5179</a>
-
- <p>Yannic Boneberger discovered an error in the ServiceWorker implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17462">CVE-2018-17462</a>
-
- <p>Ned Williamson and Niklas Baumstark discovered a way to escape the sandbox.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17463">CVE-2018-17463</a>
-
- <p>Ned Williamson and Niklas Baumstark discovered a remote code execution
- issue in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17464">CVE-2018-17464</a>
-
- <p>xisigr discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17465">CVE-2018-17465</a>
-
- <p>Lin Zuojian discovered a use-after-free issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17466">CVE-2018-17466</a>
-
- <p>Omair discovered a memory corruption issue in the angle library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17467">CVE-2018-17467</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17468">CVE-2018-17468</a>
-
- <p>Jams Lee discovered an information disclosure issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17469">CVE-2018-17469</a>
-
- <p>Zhen Zhou discovered a buffer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17470">CVE-2018-17470</a>
-
- <p>Zhe Jin discovered a memory corruption issue in the GPU backend
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17471">CVE-2018-17471</a>
-
- <p>Lnyas Zhang discovered an issue with the full screen user interface.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17473">CVE-2018-17473</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17474">CVE-2018-17474</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17475">CVE-2018-17475</a>
-
- <p>Vladimir Metnew discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17476">CVE-2018-17476</a>
-
- <p>Khalil Zhani discovered an issue with the full screen user interface.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17477">CVE-2018-17477</a>
-
- <p>Aaron Muir Hamilton discovered a user interface spoofing issue in the
- extensions pane.</p></li>
-
-</ul>
-
-<p>This update also fixes a buffer overflow in the embedded lcms library included
-with chromium.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를
-70.0.3538.67-1~deb9u1 버전에서 수정했습니다.</p>
-
-<p>chromium-browser 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium-browser의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium-browser">https://security-tracker.debian.org/tracker/chromium-browser</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4330.data"
diff --git a/korean/security/2018/dsa-4331.wml b/korean/security/2018/dsa-4331.wml
deleted file mode 100644
index aadbd886cc6..00000000000
--- a/korean/security/2018/dsa-4331.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-#use wml::debian::translation-check translation="ce2c6df5f974a2c9be8ca06bb4afda282a57e3f9" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in cURL, an URL transfer library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16839">CVE-2018-16839</a>
-
- <p>Harry Sintonen discovered that, on systems with a 32 bit size_t, an
- integer overflow would be triggered when a SASL user name longer
- than 2GB is used. This would in turn cause a very small buffer to be
- allocated instead of the intended very huge one, which would trigger
- a heap buffer overflow when the buffer is used.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16842">CVE-2018-16842</a>
-
- <p>Brian Carpenter discovered that the logic in the curl tool to wrap
- error messages at 80 columns is flawed, leading to a read buffer
- overflow if a single word in the message is itself longer than 80
- bytes.</p></li>
-
-</ul>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 7.52.1-5+deb9u8.</p>
-
-<p>curl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">\
-https://security-tracker.debian.org/tracker/curl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4331.data"
diff --git a/korean/security/2018/dsa-4332.wml b/korean/security/2018/dsa-4332.wml
deleted file mode 100644
index 76ad6a0a514..00000000000
--- a/korean/security/2018/dsa-4332.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-#use wml::debian::translation-check translation="47392efd21a71717e3d185eeb02d51f7fe74be33" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the interpreter for the
-Ruby language. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16395">CVE-2018-16395</a>
-
- <p>Tyler Eckstein reported that the equality check of
- OpenSSL::X509::Name could return true for non-equal objects. If a
- malicious X.509 certificate is passed to compare with an existing
- certificate, there is a possibility to be judged incorrectly that
- they are equal.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16396">CVE-2018-16396</a>
-
- <p>Chris Seaton discovered that tainted flags are not propagated in
- Array#pack and String#unpack with some directives.</p></li>
-
-</ul>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 2.3.3-1+deb9u4.</p>
-
-<p>ruby2.3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of ruby2.3 please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby2.3">https://security-tracker.debian.org/tracker/ruby2.3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4332.data"
diff --git a/korean/security/2018/dsa-4333.wml b/korean/security/2018/dsa-4333.wml
deleted file mode 100644
index 23d2459c9a0..00000000000
--- a/korean/security/2018/dsa-4333.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="d6dcc12a82bb49abdfb729627b48b4ebac3ec085" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Nick Rolfe discovered multiple buffer overflows in the Icecast multimedia
-streaming server which could result in the execution of arbitrary code.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 2.4.2-1+deb9u1.</p>
-
-<p>icecast2 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of icecast2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/icecast2">\
-https://security-tracker.debian.org/tracker/icecast2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4333.data"
diff --git a/korean/security/2018/dsa-4334.wml b/korean/security/2018/dsa-4334.wml
deleted file mode 100644
index 5f1ea85eb9e..00000000000
--- a/korean/security/2018/dsa-4334.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="dfae2db1747e0329dcb03f343ab6a9328504bc7f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in MuPDF, a PDF, XPS, and e-book
-viewer which could result in denial of service or the execution of
-arbitrary code if malformed documents are opened.</p>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 1.9a+ds1-4+deb9u4.</p>
-
-<p>mupdf 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of mupdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mupdf">\
-https://security-tracker.debian.org/tracker/mupdf</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4334.data"
diff --git a/korean/security/2018/dsa-4338.wml b/korean/security/2018/dsa-4338.wml
deleted file mode 100644
index ddda7155904..00000000000
--- a/korean/security/2018/dsa-4338.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="83934a2f26614ea9763cb52ff41f5677e8a56eac" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Integer overflows in the processing of packets in network cards emulated
-by QEMU, a fast processor emulator, could result in denial of service.</p>
-
-<p>In addition this update backports support to passthrough the new CPU
-features added in the intel-microcode update shipped in DSA 4273 to
-x86-based guests.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를
-버전 1:2.8+dfsg-6+deb9u5에서 수정했습니다.</p>
-
-<p>qemu 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>qemu의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/qemu">\
-https://security-tracker.debian.org/tracker/qemu</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4338.data"
diff --git a/korean/security/2018/dsa-4339.wml b/korean/security/2018/dsa-4339.wml
deleted file mode 100644
index b691444d48b..00000000000
--- a/korean/security/2018/dsa-4339.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="c1763bbf92b379a36ce63d2b8ac86ad7b4c6a7ff" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Ceph, a distributed storage
-and file system: The cephx authentication protocol was suspectible to
-replay attacks and calculated signatures incorrectly, <q>ceph mon</q> did not
-validate capabilities for pool operations (resulting in potential
-corruption or deletion of snapshot images) and a format string
-vulnerability in libradosstriper could result in denial of service.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 10.2.11-1에서 수정했습니다.</p>
-
-<p>ceph 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ceph의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ceph">https://security-tracker.debian.org/tracker/ceph</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4339.data"
diff --git a/korean/security/2018/dsa-4344.wml b/korean/security/2018/dsa-4344.wml
deleted file mode 100644
index fff22d2c75d..00000000000
--- a/korean/security/2018/dsa-4344.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="8e8be7e1310df833bbd582664555a9b8b62956f6" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Aidan Marlin discovered that roundcube, a skinnable AJAX based webmail
-solution for IMAP servers, is prone to a cross-site scripting
-vulnerability in handling invalid style tag content.</p>
-
-<p>안정 버전(stretch)에서, 이 문제는 1.2.3+dfsg.1-4+deb9u3 버전에서 수정되었습니다.</p>
-
-<p>roundcube 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>roundcube의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4344.data"
diff --git a/korean/security/2018/dsa-4345.wml b/korean/security/2018/dsa-4345.wml
deleted file mode 100644
index 42c13058ad3..00000000000
--- a/korean/security/2018/dsa-4345.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-#use wml::debian::translation-check translation="1d1f8d159bd57a26b5a8603a6dfc4a1937981b1c" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
-print, and login server for Unix. The Common Vulnerabilities and
-Exposures project identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14629">CVE-2018-14629</a>
-
- <p>Florian Stuelpner discovered that Samba is vulnerable to
- infinite query recursion caused by CNAME loops, resulting in
- denial of service.</p>
-
- <p><a href="https://www.samba.org/samba/security/CVE-2018-14629.html">\
- https://www.samba.org/samba/security/CVE-2018-14629.html</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16841">CVE-2018-16841</a>
-
- <p>Alex MacCuish discovered that a user with a valid certificate or
- smart card can crash the Samba AD DC's KDC when configured to accept
- smart-card authentication.</p>
-
- <p><a href="https://www.samba.org/samba/security/CVE-2018-16841.html">\
- https://www.samba.org/samba/security/CVE-2018-16841.html</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16851">CVE-2018-16851</a>
-
- <p>Garming Sam of the Samba Team and Catalyst discovered a NULL pointer
- dereference vulnerability in the Samba AD DC LDAP server allowing a
- user able to read more than 256MB of LDAP entries to crash the Samba
- AD DC's LDAP server.</p>
-
- <p><a href="https://www.samba.org/samba/security/CVE-2018-16851.html">\
- https://www.samba.org/samba/security/CVE-2018-16851.html</a></p></li>
-
-</ul>
-
-<p>안정 버전(stretch)에서, 이 문제를 버전 2:4.5.12+dfsg-2+deb9u4에서 수정했습니다.
-</p>
-
-<p>samba 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>samba의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/samba">\
-https://security-tracker.debian.org/tracker/samba</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4345.data"
diff --git a/korean/security/2018/dsa-4346.wml b/korean/security/2018/dsa-4346.wml
deleted file mode 100644
index c3f2fbfe9b1..00000000000
--- a/korean/security/2018/dsa-4346.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="6e01f4fba8d847ed19962aa1aaf320df50c01910" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Ghostscript, the GPL
-PostScript/PDF interpreter, which may result in denial of service or the
-execution of arbitrary code if a malformed Postscript file is processed
-(despite the -dSAFER sandbox being enabled).</p>
-
-<p>This update rebases ghostscript for stretch to the upstream version 9.26
-which includes additional changes.</p>
-
-<p>안정버전(stretch)에서, 이 문제를 버전 9.26~dfsg-0+deb9u1에서 수정했습니다.</p>
-
-<p>ghostscript 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ghostscript의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4346.data"
diff --git a/korean/security/2018/dsa-4347.wml b/korean/security/2018/dsa-4347.wml
deleted file mode 100644
index 49b36cc503a..00000000000
--- a/korean/security/2018/dsa-4347.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-#use wml::debian::translation-check translation="165625c3a669960bb5e1c766db812564b5fd665e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the implementation of the
-Perl programming language. The Common Vulnerabilities and Exposures
-project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18311">CVE-2018-18311</a>
-
- <p>Jayakrishna Menon and Christophe Hauser discovered an integer
- overflow vulnerability in Perl_my_setenv leading to a heap-based
- buffer overflow with attacker-controlled input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18312">CVE-2018-18312</a>
-
- <p>Eiichi Tsukata discovered that a crafted regular expression could
- cause a heap-based buffer overflow write during compilation,
- potentially allowing arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18313">CVE-2018-18313</a>
-
- <p>Eiichi Tsukata discovered that a crafted regular expression could
- cause a heap-based buffer overflow read during compilation which
- leads to information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18314">CVE-2018-18314</a>
-
- <p>Jakub Wilk discovered that a specially crafted regular expression
- could lead to a heap-based buffer overflow.</p></li>
-
-</ul>
-
-<p>안정 버전(stretch)에서, 이 문제를 버전 5.24.1-3+deb9u5에서 수정했습니다.</p>
-
-<p>perl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>perl의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/perl">https://security-tracker.debian.org/tracker/perl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4347.data"
diff --git a/korean/security/2018/dsa-4350.wml b/korean/security/2018/dsa-4350.wml
deleted file mode 100644
index 7774969b405..00000000000
--- a/korean/security/2018/dsa-4350.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="b8c497c9b65e0b3c9f962e66e3f454c49ed0017c" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that incorrect processing of very high UIDs in
-Policykit, a framework for managing administrative policies and
-privileges, could result in authentication bypass.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 0.105-18+deb9u1.</p>
-
-<p>policykit-1 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of policykit-1 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/policykit-1">\
-https://security-tracker.debian.org/tracker/policykit-1</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4350.data"
diff --git a/korean/security/2018/dsa-4351.wml b/korean/security/2018/dsa-4351.wml
deleted file mode 100644
index 4ab942c079b..00000000000
--- a/korean/security/2018/dsa-4351.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="1546149939907cc909ba2da3cf1b949ba05e4a24" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that PHPMailer, a library to send email from PHP
-applications, is prone to a PHP object injection vulnerability,
-potentially allowing a remote attacker to execute arbitrary code.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 5.2.14+dfsg-2.3+deb9u1.</p>
-
-<p>libphp-phpmailer 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of libphp-phpmailer please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libphp-phpmailer">https://security-tracker.debian.org/tracker/libphp-phpmailer</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4351.data"
diff --git a/korean/security/2018/dsa-4352.wml b/korean/security/2018/dsa-4352.wml
deleted file mode 100644
index 78bcf9dcc8c..00000000000
--- a/korean/security/2018/dsa-4352.wml
+++ /dev/null
@@ -1,139 +0,0 @@
-#use wml::debian::translation-check translation="2fffb6d907665c5179287a533ba1d4ef4412e32a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>chromium 웹 브라우저에서 여러 취약점을 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17480">CVE-2018-17480</a>
-
- <p>Guang Gong discovered an out-of-bounds write issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17481">CVE-2018-17481</a>
-
- <p>Several use-after-free issues were discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18335">CVE-2018-18335</a>
-
- <p>A buffer overflow issue was discovered in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18336">CVE-2018-18336</a>
-
- <p>Huyna discovered a use-after-free issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18337">CVE-2018-18337</a>
-
- <p>cloudfuzzer discovered a use-after-free issue in blink/webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18338">CVE-2018-18338</a>
-
- <p>Zhe Jin discovered a buffer overflow issue in the canvas renderer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18339">CVE-2018-18339</a>
-
- <p>cloudfuzzer discovered a use-after-free issue in the WebAudio
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18340">CVE-2018-18340</a>
-
- <p>A use-after-free issue was discovered in the MediaRecorder implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18341">CVE-2018-18341</a>
-
- <p>cloudfuzzer discovered a buffer overflow issue in blink/webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18342">CVE-2018-18342</a>
-
- <p>Guang Gong discovered an out-of-bounds write issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18343">CVE-2018-18343</a>
-
- <p>Tran Tien Hung discovered a use-after-free issue in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18344">CVE-2018-18344</a>
-
- <p>Jann Horn discovered an error in the Extensions implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18345">CVE-2018-18345</a>
-
- <p>Masato Kinugawa and Jun Kokatsu discovered an error in the Site Isolation
- feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18346">CVE-2018-18346</a>
-
- <p>Luan Herrera discovered an error in the user interface.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18347">CVE-2018-18347</a>
-
- <p>Luan Herrera discovered an error in the Navigation implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18348">CVE-2018-18348</a>
-
- <p>Ahmed Elsobky discovered an error in the omnibox implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18349">CVE-2018-18349</a>
-
- <p>David Erceg discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18350">CVE-2018-18350</a>
-
- <p>Jun Kokatsu discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18351">CVE-2018-18351</a>
-
- <p>Jun Kokatsu discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18352">CVE-2018-18352</a>
-
- <p>Jun Kokatsu discovered an error in Media handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18353">CVE-2018-18353</a>
-
- <p>Wenxu Wu discovered an error in the network authentication implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18354">CVE-2018-18354</a>
-
- <p>Wenxu Wu discovered an error related to integration with GNOME Shell.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18355">CVE-2018-18355</a>
-
- <p>evil1m0 discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18356">CVE-2018-18356</a>
-
- <p>Tran Tien Hung discovered a use-after-free issue in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18357">CVE-2018-18357</a>
-
- <p>evil1m0 discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18358">CVE-2018-18358</a>
-
- <p>Jann Horn discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18359">CVE-2018-18359</a>
-
- <p>cyrilliu discovered an out-of-bounds read issue in the v8 javascript
- library.</p></li>
-
-</ul>
-
-<p>Several additional security relevant issues are also fixed in this update
-that have not yet received CVE identifiers.</p>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 71.0.3578.80-1~deb9u1.</p>
-
-<p>chromium-browser 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of chromium-browser please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/chromium-browser">\
-https://security-tracker.debian.org/tracker/chromium-browser</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4352.data"
diff --git a/korean/security/2018/dsa-4353.wml b/korean/security/2018/dsa-4353.wml
deleted file mode 100644
index 4a98fc06b6f..00000000000
--- a/korean/security/2018/dsa-4353.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="c4f5a9b7b36060e89ec006b8bca2732d18d8bf8a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in PHP, a widely-used open source
-general purpose scripting language: The EXIF module was susceptible to
-denial of service/information disclosure when parsing malformed images,
-the Apache module allowed cross-site-scripting via the body of a
-"Transfer-Encoding: chunked" request and the IMAP extension performed
-insufficient input validation which can result in the execution of
-arbitrary shell commands in the imap_open() function and denial of
-service in the imap_mail() function.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 7.0.33-0+deb9u1 버전에서 수정했습니다.</p>
-
-<p>php7.0 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php7.0의 자세한 보안 상태는:
-<a href="https://security-tracker.debian.org/tracker/php7.0">https://security-tracker.debian.org/tracker/php7.0</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4353.data"
diff --git a/korean/security/2018/dsa-4354.wml b/korean/security/2018/dsa-4354.wml
deleted file mode 100644
index 08acba5e9e8..00000000000
--- a/korean/security/2018/dsa-4354.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="234a275bc642d55f44a2829ff34ce4e95997746a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or bypass of the same-origin policy.</p>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 60.4.0esr-1~deb9u1.</p>
-
-<p>firefox-esr 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>firefox-esr의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4354.data"
diff --git a/korean/security/2018/dsa-4356.wml b/korean/security/2018/dsa-4356.wml
deleted file mode 100644
index f8c5dfb5f69..00000000000
--- a/korean/security/2018/dsa-4356.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="f603e5f228363d4cb4204680086d7159057e458f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Jacob Baines discovered a flaw in the handling of the DSI Opensession
-command in Netatalk, an implementation of the AppleTalk Protocol Suite,
-allowing an unauthenticated user to execute arbitrary code with root
-privileges.</p>
-
-<p>안정 배포(stretch)에서, 이 문제는 2.2.5-2+deb9u1 버전에서 수정했습니다.</p>
-
-<p>netatalk 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>netatalk의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/netatalk">https://security-tracker.debian.org/tracker/netatalk</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4356.data"
diff --git a/korean/security/2018/dsa-4358.wml b/korean/security/2018/dsa-4358.wml
deleted file mode 100644
index d9714896596..00000000000
--- a/korean/security/2018/dsa-4358.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="0f190f575d9a6e82bee320fe416647841a7f264e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>The Shopify Application Security Team discovered that ruby-sanitize, a
-whitelist-based HTML sanitizer, is prone to a HTML injection
-vulnerability. A specially crafted HTML fragment can cause to allow nonwhitelisted attributes to be used on a whitelisted HTML element.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 2.1.0-2+deb9u1.</p>
-
-<p>ruby-sanitize 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ruby-sanitize의 자세한 보안 상태는
-보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ruby-sanitize">https://security-tracker.debian.org/tracker/ruby-sanitize</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4358.data"
diff --git a/korean/security/2018/dsa-4359.wml b/korean/security/2018/dsa-4359.wml
deleted file mode 100644
index c93e486d84a..00000000000
--- a/korean/security/2018/dsa-4359.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="ee21dc37fb23ea84beba56e6392fce89bd93382a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Wireshark, a network
-protocol analyzer, which could result in denial of service or the
-execution of arbitrary code.</p>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 2.6.5-1~deb9u1.</p>
-
-<p>wireshark 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>wireshark의 자세한 보안 상태는
-보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/wireshark">\
-https://security-tracker.debian.org/tracker/wireshark</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4359.data"
diff --git a/korean/security/2018/dsa-4360.wml b/korean/security/2018/dsa-4360.wml
deleted file mode 100644
index 6ee8ff597a2..00000000000
--- a/korean/security/2018/dsa-4360.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="ae0b39f48f599ac19f9d6570b72ac88c85bd90a1" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in libarchive, a multi-format archive
-and compression library: Processing malformed RAR archives could result
-in denial of service or the execution of arbitrary code and malformed
-WARC, LHarc, ISO, Xar or CAB archives could result in denial of service.</p>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 3.2.2-2+deb9u1.</p>
-
-<p>libarchive 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libarchive의 자세한 보안 상태는
-보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libarchive">\
-https://security-tracker.debian.org/tracker/libarchive</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4360.data"
diff --git a/korean/security/2018/dsa-4361.wml b/korean/security/2018/dsa-4361.wml
deleted file mode 100644
index ee1795d1146..00000000000
--- a/korean/security/2018/dsa-4361.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="e422097318c2b9061a3de717e10cd1c63589dbdf" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libextractor, a library to
-extract arbitrary meta-data from files, which may lead to denial of
-service or memory disclosure if a malformed OLE file is processed.</p>
-
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 1:1.3-4+deb9u3.</p>
-
-<p>libextractor 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libextractor의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libextractor">\
-https://security-tracker.debian.org/tracker/libextractor</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4361.data"
diff --git a/korean/security/2019/dsa-4363.wml b/korean/security/2019/dsa-4363.wml
deleted file mode 100644
index 84fc9b0b62c..00000000000
--- a/korean/security/2019/dsa-4363.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="a30fc86ea21305333ea2670e4ae537412db1a858" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that malformed URLs could spoof the content of the
-default 404 page of Django, a Python web development framework.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 1:1.10.7-2+deb9u4.</p>
-
-<p>python-django 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-django의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-django">\
-https://security-tracker.debian.org/tracker/python-django</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4363.data"
diff --git a/korean/security/2019/dsa-4364.wml b/korean/security/2019/dsa-4364.wml
deleted file mode 100644
index e75565f6690..00000000000
--- a/korean/security/2019/dsa-4364.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="4e651f5536a27d2765ba4140b02cc398cdb5f7fd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that ruby-loofah, a general library for manipulating
-and transforming HTML/XML documents and fragments, performed insufficient
-sanitising of SVG elements.</p>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 2.0.3-2+deb9u2.</p>
-
-<p>ruby-loofah 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ruby-loofah의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ruby-loofah">\
-https://security-tracker.debian.org/tracker/ruby-loofah</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4364.data"
diff --git a/korean/security/2019/dsa-4365.wml b/korean/security/2019/dsa-4365.wml
deleted file mode 100644
index c1e0d73d78f..00000000000
--- a/korean/security/2019/dsa-4365.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="c3f09e2a38bea05e9ae85e2e7af413e1eda70975" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Stephen Roettger discovered a race condition in tmpreaper, a program that
-cleans up files in directories based on their age, which could result in
-local privilege escalation.</p>
-
-<p>안정 배포(stretch)에서, 이 문제는 버전 1.6.13+nmu1+deb9u1에서 수정되었습니다.</p>
-
-<p>tmpreaper 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>tmpreaper의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/tmpreaper">\
-https://security-tracker.debian.org/tracker/tmpreaper</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4365.data"
diff --git a/korean/security/2019/dsa-4366.wml b/korean/security/2019/dsa-4366.wml
deleted file mode 100644
index 3884943cd8c..00000000000
--- a/korean/security/2019/dsa-4366.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="e38897fa2f512b6bd8aa6fc56e01320b30c21fec" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>An integer underflow was discovered in the CAF demuxer of the VLC
-media player.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 3.0.6-0+deb9u1에서 수정했습니다.</p>
-
-<p>vlc 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>vlc의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/vlc">\
-https://security-tracker.debian.org/tracker/vlc</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4366.data"
diff --git a/korean/security/2019/dsa-4367.wml b/korean/security/2019/dsa-4367.wml
deleted file mode 100644
index 02737a8880b..00000000000
--- a/korean/security/2019/dsa-4367.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-#use wml::debian::translation-check translation="9b882a5d38bd6c3c5a8d79a39b0033bc189699c0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Labs discovered multiple vulnerabilities in
-systemd-journald. Two memory corruption flaws, via attacker-controlled
-allocations using the alloca function (<a href="https://security-tracker.debian.org/tracker/CVE-2018-16864">CVE-2018-16864</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-16865">CVE-2018-16865</a>)
-and an out-of-bounds read flaw leading to an information leak
-(<a href="https://security-tracker.debian.org/tracker/CVE-2018-16866">CVE-2018-16866</a>),
-could allow an attacker to cause a denial of service or the execution of
-arbitrary code.</p>
-
-<p>Further details in the Qualys Security Advisory at
-<a href="https://www.qualys.com/2019/01/09/system-down/system-down.txt">https://www.qualys.com/2019/01/09/system-down/system-down.txt</a></p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 232-25+deb9u7에서 수정했습니다.</p>
-
-<p>systemd 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of systemd의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/systemd">https://security-tracker.debian.org/tracker/systemd</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4367.data"
diff --git a/korean/security/2019/dsa-4368.wml b/korean/security/2019/dsa-4368.wml
deleted file mode 100644
index 6bd54eeed52..00000000000
--- a/korean/security/2019/dsa-4368.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="3af3ca701db359cb0e776a690fd5e1cbcae67627" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Guido Vranken discovered that an incorrect bounds check in ZeroMQ, a
-lightweight messaging kernel, could result in the execution of arbitrary
-code.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 4.2.1-4+deb9u1에서 수정했습니다.</p>
-
-<p>zeromq3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>zeromq3의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/zeromq3">\
-https://security-tracker.debian.org/tracker/zeromq3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4368.data"
diff --git a/korean/security/2019/dsa-4369.wml b/korean/security/2019/dsa-4369.wml
deleted file mode 100644
index 1e3b105daaa..00000000000
--- a/korean/security/2019/dsa-4369.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-#use wml::debian::translation-check translation="8a1c0e346cc4b60809eb2067ebcb114fe8cc027d" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Xen hypervisor에서 여러 취약점을 발견했습니다:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19961">CVE-2018-19961</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-19962">CVE-2018-19962</a>
-
- <p>Paul Durrant discovered that incorrect TLB handling could result in
- denial of service, privilege escalation or information leaks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19965">CVE-2018-19965</a>
-
- <p>Matthew Daley discovered that incorrect handling of the INVPCID
- instruction could result in denial of service by PV guests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19966">CVE-2018-19966</a>
-
- <p>It was discovered that a regression in the fix to address
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-15595">CVE-2017-15595</a>
- could result in denial of service, privilege
- escalation or information leaks by a PV guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19967">CVE-2018-19967</a>
-
- <p>It was discovered that an error in some Intel CPUs could result in
- denial of service by a guest instance.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 4.8.5+shim4.10.2+xsa282-1+deb9u11에서 수정했습니다.</p>
-
-<p>xen 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>xen의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/xen">\
-https://security-tracker.debian.org/tracker/xen</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4369.data"
diff --git a/korean/security/2019/dsa-4371.wml b/korean/security/2019/dsa-4371.wml
deleted file mode 100644
index 2db051ad455..00000000000
--- a/korean/security/2019/dsa-4371.wml
+++ /dev/null
@@ -1,191 +0,0 @@
-#use wml::debian::translation-check translation="901f7a15374b175ce7794ff11269a24e33da9dd5" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Max Justicz discovered a vulnerability in APT, the high level package manager.
-The code handling HTTP redirects in the HTTP transport method doesn't properly
-sanitize fields transmitted over the wire. This vulnerability could be used by
-an attacker located as a man-in-the-middle between APT and a mirror to inject
-malicous content in the HTTP connection. This content could then be recognized
-as a valid package by APT and used later for code execution with root
-privileges on the target machine.</p>
-
-<p>Since the vulnerability is present in the package manager itself, it is
-recommended to disable redirects in order to prevent exploitation during this
-upgrade only, using:</p>
-
-<code>apt -o Acquire::http::AllowRedirect=false update<br />
-apt -o Acquire::http::AllowRedirect=false upgrade</code>
-
-<p>This is known to break some proxies when used against security.debian.org. If
-that happens, people can switch their security APT source to use:</p>
-
-<code>deb <a href="http://cdn-fastly.deb.debian.org/debian-security">http://cdn-fastly.deb.debian.org/debian-security</a> stable/updates main</code>
-
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 1.4.9.</p>
-
-<p>apt 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>특정 업그레이드 명령:</p>
-
-<p>If upgrading using APT without redirect is not possible in your situation, you
-can manually download the files (using wget/curl) for your architecture using
-the URL provided below, verifying that the hashes match. Then you can install
-them using dpkg -i.</p>
-
-<p>소스 아카이브:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9.dsc">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9.dsc</a>
- Size/SHA256 checksum: 2549 986d98b00caac809341f65acb3d14321d645ce8e87e411c26c66bf149a10dfea<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9.tar.xz">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9.tar.xz</a>
- Size/SHA256 checksum: 2079572 d4d65e7c84da86f3e6dcc933bba46a08db429c9d933b667c864f5c0e880bac0d</p>
-
-<p>Architecture independent files:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-doc_1.4.9_all.deb">http://security.debian.org/pool/updates/main/a/apt/apt-doc_1.4.9_all.deb</a>
- Size/SHA256 checksum: 365094 8880640591f64ab7b798f0421d18cba618512ca61ed7c44fbbbb6140423551d5<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-doc_1.4.9_all.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-doc_1.4.9_all.deb</a>
- Size/SHA256 checksum: 1004234 42f4c5945c4c471c3985db1cec7adcac516cc21a497a438f3ea0a2bfa7ffe036</p>
-
-<p>amd64 architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_amd64.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_amd64.deb</a>
- Size/SHA256 checksum: 170820 c8c4366d1912ff8223615891397a78b44f313b0a2f15a970a82abe48460490cb<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_amd64.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_amd64.deb</a>
- Size/SHA256 checksum: 409958 fb227d1c4615197a6263e7312851ac3601d946221cfd85f20427a15ab9658d15<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_amd64.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_amd64.deb</a>
- Size/SHA256 checksum: 1231594 dddf4ff686845b82c6c778a70f1f607d0bb9f8aa43f2fb7983db4ff1a55f5fae<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_amd64.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_amd64.deb</a>
- Size/SHA256 checksum: 192382 a099c57d20b3e55d224433b7a1ee972f6fdb79911322882d6e6f6a383862a57d<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_amd64.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_amd64.deb</a>
- Size/SHA256 checksum: 235220 cfb0a03ecd22aba066d97e75d4d00d791c7a3aceb2e5ec4fbee7176389717404<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_amd64.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_amd64.deb</a>
- Size/SHA256 checksum: 916448 03281e3d1382826d5989c12c77a9b27f5f752b0f6aa28b524a2df193f7296e0b</p>
-
-<p>arm64 architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_arm64.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_arm64.deb</a>
- Size/SHA256 checksum: 167674 6635e174290f89555a2eb9cbc083b1fa566b2cd65318212c8c760b87bfb2c544<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_arm64.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_arm64.deb</a>
- Size/SHA256 checksum: 401136 f7e95f4fbc94409ff4dceb16626beb6cd0eecff5e6982e1bf808af014ea7331f<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_arm64.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_arm64.deb</a>
- Size/SHA256 checksum: 1202864 54abf458ed6b78f56638771fa30cdc9e482469cc0e2dfc2146b3606ea22a3449<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_arm64.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_arm64.deb</a>
- Size/SHA256 checksum: 191188 27d1254e03a80f77458e2c2aceb097c9a85e9cefb4623643a1e25b45e0b889ae<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_arm64.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_arm64.deb</a>
- Size/SHA256 checksum: 235220 3f046e34009db988edd4e0474b13100ba92adf3beac16456785ee16940b51f2d<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_arm64.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_arm64.deb</a>
- Size/SHA256 checksum: 855612 c3b333927f340bb044ec44f2bfe2abced35ebb3e91457ae91249d26058e7b796</p>
-
-<p>armel architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_armel.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_armel.deb</a>
- Size/SHA256 checksum: 165820 179bcd2457beb0c8449101684c40dc94c9882166b17d584162109928d124cffc<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_armel.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_armel.deb</a>
- Size/SHA256 checksum: 394280 90f760e7480582bcabc2a2f50a44a2d1f5ce4070370295832bc82424887e5289<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_armel.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_armel.deb</a>
- Size/SHA256 checksum: 1190316 862ba546c54b66732d2a2d17b44aa4d20109f2bd4ba158d62d158ba190eed649<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_armel.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_armel.deb</a>
- Size/SHA256 checksum: 189878 531e3a673d24b3ae79babc5110d3b27cdbd7a274c0839ff650d691d88d28d8d7<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_armel.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_armel.deb</a>
- Size/SHA256 checksum: 235218 46ecb77704fb8957505d96bdfa7c1f190559914ad96297a6b15609ed1a1a24d9<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_armel.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_armel.deb</a>
- Size/SHA256 checksum: 829040 6d2ca52d1823ca3100a2bc3d98ed15aca5af1b59203006794b8e8cb4575433b0</p>
-
-<p>armhf architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_armhf.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_armhf.deb</a>
- Size/SHA256 checksum: 166962 523bf76fd9ee262b08fb04ce2afcd5c0d4e81087c111f31179f5ec2882bbbe93<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_armhf.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_armhf.deb</a>
- Size/SHA256 checksum: 397912 4d4699621974098a2d7d1d76c4ee5995e0a56c40a336bbc008308f799cc6bc77<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_armhf.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_armhf.deb</a>
- Size/SHA256 checksum: 1198550 0d2b46b839041ac660a33bb17477e66a5317690135346a9a616dfb2efc07906d<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_armhf.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_armhf.deb</a>
- Size/SHA256 checksum: 189906 37acb514874d95cd39991ff0c759bf17ba2d7f1af746b5e0767b1ee2da52f892<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_armhf.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_armhf.deb</a>
- Size/SHA256 checksum: 235220 2596fbe7bbad28d57374a2ab6278e9be7cb01e0eee4733f66b76a62492db46e8<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_armhf.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_armhf.deb</a>
- Size/SHA256 checksum: 851386 a7619b4cf5b6205bae21cd25fcc8a856dc108e9f1be6c48e246379f157dc8703</p>
-
-<p>i386 architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_i386.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_i386.deb</a>
- Size/SHA256 checksum: 174508 1e7a22d8f976f56ace375e7e02e19b2629a68e6e28c71d9b9126aa0ac3d3175c<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_i386.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_i386.deb</a>
- Size/SHA256 checksum: 421244 25835d5ae4330608421ac4cc6e5c938d36590b55f88bae8ba49b8ce95f3edee1<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_i386.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_i386.deb</a>
- Size/SHA256 checksum: 1263876 e5ce4790d6565634199199f6bf1d29986468603748aa56d135067ae878416649<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_i386.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_i386.deb</a>
- Size/SHA256 checksum: 194534 5937ffef18ef22271a616d32388b50a06ee0ce6ccab90ca870548b9aa5b29e32<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_i386.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_i386.deb</a>
- Size/SHA256 checksum: 235220 0b045d17a2b45aa59b55c6c5ccd47f738e2edeb189cd892d710f0e35b4d09b27<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_i386.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_i386.deb</a>
- Size/SHA256 checksum: 989166 16e6470005d25741a9bf39c02ba3f287fda0a66dda8a5859c0efa24a97f56351</p>
-
-<p>mips64el architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_mips64el.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_mips64el.deb</a>
- Size/SHA256 checksum: 168898 c3af79ed48010edb558d1e80b1a6ee182c66e234506de96c056844743234c9ba<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_mips64el.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_mips64el.deb</a>
- Size/SHA256 checksum: 407486 d634b98ae56c7d4e8640fbdb515a17a53d86a3f53a1890edbc40085fa2e6b1be<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_mips64el.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_mips64el.deb</a>
- Size/SHA256 checksum: 1212204 d9d44ffb8b1860071908267ebda728e8d1086fc911eb66e16f52de07547af6da<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_mips64el.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_mips64el.deb</a>
- Size/SHA256 checksum: 192760 6d3fc127c587cce8de194ea7976e3c2664515f5c7959428d89c0d01affcf8567<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_mips64el.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_mips64el.deb</a>
- Size/SHA256 checksum: 235226 30b6ae87ecb434fb008760d2ccd29c2f70cbd44a130eb4731b040d8893dfc909<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_mips64el.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_mips64el.deb</a>
- Size/SHA256 checksum: 850490 51e697b30b4f9f5ff0d942e04fb48962e6ae9a898d6bd165d16733c064325fd8</p>
-
-<p>mips architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_mips.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_mips.deb</a>
- Size/SHA256 checksum: 169328 4e9b54777d8c2a5813fa8e4aa395a91b587edd33f4ef661898ada4cbc8943197<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_mips.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_mips.deb</a>
- Size/SHA256 checksum: 408388 8a834ddee8e6182de5768e12564137eb063bee6b1918d4c08c88b9c11a4cb856<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_mips.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_mips.deb</a>
- Size/SHA256 checksum: 1212756 ea41a5c84b953bb818a6779a141efdcd3e2b46c895eb64e9c0e11d49755bf256<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_mips.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_mips.deb</a>
- Size/SHA256 checksum: 192556 2e09a9207914f215686a6b305a0e46bbdeb46c18ba9ea9115631ed216a2896cb<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_mips.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_mips.deb</a>
- Size/SHA256 checksum: 235216 2c582528fb38966de60476e2121037a80d3357fd95cc8e1453c3e5a52d030655<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_mips.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_mips.deb</a>
- Size/SHA256 checksum: 858768 125dcd2c1e284600a94a5a471a96534c03e55c9c3091ad06b8d5bfef4d65a574</p>
-
-<p>mipsel architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_mipsel.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_mipsel.deb</a>
- Size/SHA256 checksum: 169958 cea079260b61817bb6163c3268e6714e09326777d8bbc2b70de7bc6f8cf9ef33<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_mipsel.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_mipsel.deb</a>
- Size/SHA256 checksum: 409708 5f95e0433899d05bceb8150a02ee444cc42476a0c81eb35ed43402a0f4f7f5fd<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_mipsel.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_mipsel.deb</a>
- Size/SHA256 checksum: 1218954 6eaf9b8d9e0239d2ffcce046892bf0d0553688dfd5e44332c0dbe84a66648545<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_mipsel.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_mipsel.deb</a>
- Size/SHA256 checksum: 192822 59c2dcfe8e23f63cd201777a11b45d5833045ada44b616ed059d223cee99311a<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_mipsel.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_mipsel.deb</a>
- Size/SHA256 checksum: 235216 7fe6c1f8074bff4a29a2988556295ef558b5650edd66145866957e2528c92f7e<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_mipsel.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_mipsel.deb</a>
- Size/SHA256 checksum: 869792 2abb3afa5689f3dd0461b998449934ce06ced68ef6cdc8e4e121196f40bd30e6</p>
-
-<p>ppc64el architecture:</p>
-
-<p><a href="http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_ppc64el.deb">http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_ppc64el.deb</a>
- Size/SHA256 checksum: 169566 9de5b780e0e0d381bb1f1cfbff5626e36bae7df6ca25f6c49affc650b88cd152<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_ppc64el.deb">http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_ppc64el.deb</a>
- Size/SHA256 checksum: 406494 5f66c194b5897c490212c15806821d6f924c1353b5031a11383f3b2ebb25d44c<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_ppc64el.deb">http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_ppc64el.deb</a>
- Size/SHA256 checksum: 1221036 b6235daa430bd3e6df37855fd8fcebe057c187335c9e45744e35694600475495<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_ppc64el.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_ppc64el.deb</a>
- Size/SHA256 checksum: 192604 92d4290b343ada2eaca425f09d56d2767b0bca5221957477515fdb9391497fa8<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_ppc64el.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_ppc64el.deb</a>
- Size/SHA256 checksum: 235222 e6ef81e5f61383584aba546056f43458cd83d1d56a96087301ba0454efdd3941<br />
-<a href="http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_ppc64el.deb">http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_ppc64el.deb</a>
- Size/SHA256 checksum: 888440 0f2987f64499f3b3f15f2d560d2d41ddc71986e557e94a20ea02af4c71481b47</p>
-
-<p>apt의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/apt">https://security-tracker.debian.org/tracker/apt</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4371.data"
diff --git a/korean/security/2019/dsa-4372.wml b/korean/security/2019/dsa-4372.wml
deleted file mode 100644
index 7f6986e03fd..00000000000
--- a/korean/security/2019/dsa-4372.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="a05dfb29c66965bb2d09e3a15d2a0c0addbbb08c" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered a vulnerability in Ghostscript, the GPL
-PostScript/PDF interpreter, which may result in denial of service or the
-execution of arbitrary code if a malformed Postscript file is processed
-(despite the -dSAFER sandbox being enabled).</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 9.26a~dfsg-0+deb9u1 버전에서 수정했습니다.</p>
-
-<p>ghostscript 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ghostscript의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4372.data"
diff --git a/korean/security/2019/dsa-4373.wml b/korean/security/2019/dsa-4373.wml
deleted file mode 100644
index f07fb3c2f3a..00000000000
--- a/korean/security/2019/dsa-4373.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-#use wml::debian::translation-check translation="08e97d6a66338b9fb8da51eb27b4c3dde971c164" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in coTURN, a TURN and STUN server for
-VoIP.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4056">CVE-2018-4056</a>
-
- <p>An SQL injection vulnerability was discovered in the coTURN administrator
- web portal. As the administration web interface is shared with the
- production, it is unfortunately not possible to easily filter outside
- access and this security update completely disable the web interface. Users
- should use the local, command line interface instead.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4058">CVE-2018-4058</a>
-
- <p>Default configuration enables unsafe loopback forwarding. A remote attacker
- with access to the TURN interface can use this vulnerability to gain access
- to services that should be local only.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4059">CVE-2018-4059</a>
-
- <p>Default configuration uses an empty password for the local command line
- administration interface. An attacker with access to the local console
- (either a local attacker or a remote attacker taking advantage of
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-4058">CVE-2018-4058</a>)
- could escalade privileges to administrator of the coTURN
- server.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 4.5.0.5-1+deb9u1에서 수정했습니다.</p>
-
-<p>coturn 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/coturn">\
-https://security-tracker.debian.org/tracker/coturn</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4373.data"
diff --git a/korean/security/2019/dsa-4374.wml b/korean/security/2019/dsa-4374.wml
deleted file mode 100644
index 1a0f5715d42..00000000000
--- a/korean/security/2019/dsa-4374.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="3533697830e63ccbcf364cd1ee3485c871f2e152" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in qtbase-opensource-src, a
-cross-platform C++ application framework, which could lead to
-denial-of-service via application crash. Additionally, this update
-fixes a problem affecting vlc, where it would start without a GUI.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 5.7.1+dfsg-3+deb9u1에서 수정했습니다.</p>
-
-<p>qtbase-opensource-src 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>qtbase-opensource-src의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/qtbase-opensource-src">\
-https://security-tracker.debian.org/tracker/qtbase-opensource-src</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4374.data"
diff --git a/korean/security/2019/dsa-4375.wml b/korean/security/2019/dsa-4375.wml
deleted file mode 100644
index 2e6ec9c3ca7..00000000000
--- a/korean/security/2019/dsa-4375.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="2e4e6e9ae1b5b13ebcc2fecf6205fad709e16991" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Christophe Fergeau discovered an out-of-bounds read vulnerability in
-spice, a SPICE protocol client and server library, which might result in
-denial of service (spice server crash), or possibly, execution of
-arbitrary code.</p>
-
-<p>안정 배포(stretch)에서,
-이 문제를 0.12.8-2.1+deb9u3 버전에서 수정했습니다.</p>
-
-<p>spice 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/spice">https://security-tracker.debian.org/tracker/spice</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4375.data"
diff --git a/korean/security/2019/dsa-4377.wml b/korean/security/2019/dsa-4377.wml
deleted file mode 100644
index 1b76585ee03..00000000000
--- a/korean/security/2019/dsa-4377.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="5ab30aafbfd62a548582887f297aa136a1d43e7b" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>The ESnet security team discovered a vulnerability in rssh, a restricted
-shell that allows users to perform only scp, sftp, cvs, svnserve
-(Subversion), rdist and/or rsync operations. Missing validation in the
-scp support could result in the bypass of this restriction, allowing the
-execution of arbitrary shell commands.</p>
-
-<p>업데이트가 적용되면 scp의 <q>-3</q> 옵션은 쓸 수 없습니다.
-</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.3.4-5+deb9u1에서 수정했습니다.</p>
-
-<p>rssh 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>rssh의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/rssh">\
-https://security-tracker.debian.org/tracker/rssh</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4377.data"
diff --git a/korean/security/2019/dsa-4378.wml b/korean/security/2019/dsa-4378.wml
deleted file mode 100644
index 472ddac30d5..00000000000
--- a/korean/security/2019/dsa-4378.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="9100a7bb07a19bd0e0ff30f6a7a76ce9a79f4f99" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Fariskhi Vidyan discovered that the PEAR Archive_Tar package for
-handling tar files in PHP is prone to a PHP object injection
-vulnerability, potentially allowing a remote attacker to execute
-arbitrary code.</p>
-
-<p>안정배포(stretch)에서, 이 문제를
-버전 1:1.10.1+submodules+notgz-9+deb9u1에서 수정했습니다.</p>
-
-<p>php-pear 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php-pear의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php-pear">https://security-tracker.debian.org/tracker/php-pear</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4378.data"
diff --git a/korean/security/2019/dsa-4379.wml b/korean/security/2019/dsa-4379.wml
deleted file mode 100644
index 9145afab7f7..00000000000
--- a/korean/security/2019/dsa-4379.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="787e00b9ef1424f75a0a0b8861e5d54c3252c3c0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in the implementation of the P-521 and
-P-384 elliptic curves, which could result in denial of service and in
-some cases key recovery.</p>
-
-<p>In addition this update fixes a vulnerability in <q>go get</q>, which could
-result in the execution of arbitrary shell commands.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1.7.4-2+deb9u1에서 수정했습니다.</p>
-
-<p>golang-1.7 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>golang-1.7의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/golang-1.7">https://security-tracker.debian.org/tracker/golang-1.7</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4379.data"
diff --git a/korean/security/2019/dsa-4380.wml b/korean/security/2019/dsa-4380.wml
deleted file mode 100644
index c3f7ea1b739..00000000000
--- a/korean/security/2019/dsa-4380.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="e1aa243819cbb2c02daf7b917e24de557160879f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in the implementation of the P-521 and
-P-384 elliptic curves, which could result in denial of service and in
-some cases key recovery.</p>
-
-<p>In addition this update fixes two vulnerabilities in <q>go get</q>, which
-could result in the execution of arbitrary shell commands.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1.8.1-1+deb9u1에서 수정했습니다.
-</p>
-
-<p>golang-1.8 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>golang-1.8의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/golang-1.8">https://security-tracker.debian.org/tracker/golang-1.8</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4380.data"
diff --git a/korean/security/2019/dsa-4382.wml b/korean/security/2019/dsa-4382.wml
deleted file mode 100644
index a2a9faa843c..00000000000
--- a/korean/security/2019/dsa-4382.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="1c446c59fe81d2896ffc8c4c25df1a888c219f9c" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Nick Cleaton discovered two vulnerabilities in rssh, a restricted shell
-that allows users to perform only scp, sftp, cvs, svnserve (Subversion),
-rdist and/or rsync operations. Missing validation in the rsync support
-could result in the bypass of this restriction, allowing the execution
-of arbitrary shell commands.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.3.4-5+deb9u2에서 수정했습니다.</p>
-
-<p>rssh 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>rssh의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/rssh">\
-https://security-tracker.debian.org/tracker/rssh</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4382.data"
diff --git a/korean/security/2019/dsa-4383.wml b/korean/security/2019/dsa-4383.wml
deleted file mode 100644
index 7b5c4b07933..00000000000
--- a/korean/security/2019/dsa-4383.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="e77aa72d123a12f996604ebe3132d972a88e24a0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Pavel Cheremushkin discovered several vulnerabilities in libvncserver, a
-library to implement VNC server/client functionalities, which might result in
-the execution of arbitrary code, denial of service or information disclosure.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 0.9.11+dfsg-1.3~deb9u1에서 수정했습니다.</p>
-
-<p>libvncserver 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libvncserver의 자세한 보안 상태는
-보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libvncserver">https://security-tracker.debian.org/tracker/libvncserver</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4383.data"
diff --git a/korean/security/2019/dsa-4385.wml b/korean/security/2019/dsa-4385.wml
deleted file mode 100644
index a0629ef1f6a..00000000000
--- a/korean/security/2019/dsa-4385.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-#use wml::debian::translation-check translation="61543f0d92cd8408059b731fb690edab0a4a3a8e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>halfdog discovered an authentication bypass vulnerability in the Dovecot
-email server. Under some configurations Dovecot mistakenly trusts the
-username provided via authentication instead of failing. If there is no
-additional password verification, this allows the attacker to login as
-anyone else in the system. Only installations using:</p>
-
-<ul>
-<li>auth_ssl_require_client_cert = yes</li>
-<li>auth_ssl_username_from_cert = yes</li>
-</ul>
-
-<p>are affected by this flaw.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1:2.2.27-3+deb9u3에서 수정했습니다.</p>
-
-<p>dovecot 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>dovecot의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/dovecot">\
-https://security-tracker.debian.org/tracker/dovecot</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4385.data"
diff --git a/korean/security/2019/dsa-4386.wml b/korean/security/2019/dsa-4386.wml
deleted file mode 100644
index c43271b3c22..00000000000
--- a/korean/security/2019/dsa-4386.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-#use wml::debian::translation-check translation="399626927b999b3938582bfb0243645dfed48f14" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점이 URL 변환 라이브러리 cURL에서 발견되었습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16890">CVE-2018-16890</a>
-
- <p>Wenxiang Qian of Tencent Blade Team discovered that the function
- handling incoming NTLM type-2 messages does not validate incoming
- data correctly and is subject to an integer overflow vulnerability,
- which could lead to an out-of-bounds buffer read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3822">CVE-2019-3822</a>
-
- <p>Wenxiang Qian of Tencent Blade Team discovered that the function
- creating an outgoing NTLM type-3 header is subject to an integer
- overflow vulnerability, which could lead to an out-of-bounds write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3823">CVE-2019-3823</a>
-
- <p>Brian Carpenter of Geeknik Labs discovered that the code handling
- the end-of-response for SMTP is subject to an out-of-bounds heap
- read.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 7.52.1-5+deb9u9에서 수정했습니다.</p>
-
-<p>curl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>curl의 자세한 보안 상태는
-보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/curl">\
-https://security-tracker.debian.org/tracker/curl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4386.data"
diff --git a/korean/security/2019/dsa-4395.wml b/korean/security/2019/dsa-4395.wml
deleted file mode 100644
index 7a0bcc87a31..00000000000
--- a/korean/security/2019/dsa-4395.wml
+++ /dev/null
@@ -1,152 +0,0 @@
-#use wml::debian::translation-check translation="13c74272ff7923316d1023584e21f19c0a5f1e92" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 chromium 웹 브라우저에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17481">CVE-2018-17481</a>
-
- <p>A use-after-free issue was discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5754">CVE-2019-5754</a>
-
- <p>Klzgrad discovered an error in the QUIC networking implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5755">CVE-2019-5755</a>
-
- <p>Jay Bosamiya discovered an implementation error in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5756">CVE-2019-5756</a>
-
- <p>A use-after-free issue was discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5757">CVE-2019-5757</a>
-
- <p>Alexandru Pitis discovered a type confusion error in the SVG image
- format implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5758">CVE-2019-5758</a>
-
- <p>Zhe Jin discovered a use-after-free issue in blink/webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5759">CVE-2019-5759</a>
-
- <p>Almog Benin discovered a use-after-free issue when handling HTML pages
- containing select elements.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5760">CVE-2019-5760</a>
-
- <p>Zhe Jin discovered a use-after-free issue in the WebRTC implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5762">CVE-2019-5762</a>
-
- <p>A use-after-free issue was discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5763">CVE-2019-5763</a>
-
- <p>Guang Gon discovered an input validation error in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5764">CVE-2019-5764</a>
-
- <p>Eyal Itkin discovered a use-after-free issue in the WebRTC implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5765">CVE-2019-5765</a>
-
- <p>Sergey Toshin discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5766">CVE-2019-5766</a>
-
- <p>David Erceg discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5767">CVE-2019-5767</a>
-
- <p>Haoran Lu, Yifan Zhang, Luyi Xing, and Xiaojing Liao reported an error
- in the WebAPKs user interface.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5768">CVE-2019-5768</a>
-
- <p>Rob Wu discovered a policy enforcement error in the developer tools.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5769">CVE-2019-5769</a>
-
- <p>Guy Eshel discovered an input validation error in blink/webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5770">CVE-2019-5770</a>
-
- <p>hemidallt discovered a buffer overflow issue in the WebGL implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5772">CVE-2019-5772</a>
-
- <p>Zhen Zhou discovered a use-after-free issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5773">CVE-2019-5773</a>
-
- <p>Yongke Wong discovered an input validation error in the IndexDB
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5774">CVE-2019-5774</a>
-
- <p>Junghwan Kang and Juno Im discovered an input validation error in the
- SafeBrowsing implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5775">CVE-2019-5775</a>
-
- <p>evil1m0 discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5776">CVE-2019-5776</a>
-
- <p>Lnyas Zhang discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5777">CVE-2019-5777</a>
-
- <p>Khalil Zhani discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5778">CVE-2019-5778</a>
-
- <p>David Erceg discovered a policy enforcement error in the Extensions
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5779">CVE-2019-5779</a>
-
- <p>David Erceg discovered a policy enforcement error in the ServiceWorker
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5780">CVE-2019-5780</a>
-
- <p>Andreas Hegenberg discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5781">CVE-2019-5781</a>
-
- <p>evil1m0 discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5782">CVE-2019-5782</a>
-
- <p>Qixun Zhao discovered an implementation error in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5783">CVE-2019-5783</a>
-
- <p>Shintaro Kobori discovered an input validation error in the developer
- tools.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5784">CVE-2019-5784</a>
-
- <p>Lucas Pinheiro discovered an implementation error in the v8 javascript
- library.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 72.0.3626.96-1~deb9u1에서 수정했습니다.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4395.data"
diff --git a/korean/security/2019/dsa-4396.wml b/korean/security/2019/dsa-4396.wml
deleted file mode 100644
index 4cc928ff4b4..00000000000
--- a/korean/security/2019/dsa-4396.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-#use wml::debian::translation-check translation="326ce30b40d6fb0de9a5955b4d8b0d7b4d143303" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 설정관리, 배포, 작업 관리 시스템인 Ansible에서 발견했습니다:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10855">CVE-2018-10855</a>
-/ <a href="https://security-tracker.debian.org/tracker/CVE-2018-16876">CVE-2018-16876</a>
-
- <p>The no_log task flag wasn't honored, resulting in an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10875">CVE-2018-10875</a>
-
- <p>ansible.cfg was read from the current working directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16837">CVE-2018-16837</a>
-
- <p>The user module leaked parameters passed to ssh-keygen to the process
- environment.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3828">CVE-2019-3828</a>
-
- <p>The fetch module was susceptible to path traversal.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.2.1.0-2+deb9u1에서 수정했습니다.</p>
-
-<p>ansible 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ansible의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-
-<a href="https://security-tracker.debian.org/tracker/ansible">https://security-tracker.debian.org/tracker/ansible</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4396.data"
diff --git a/korean/security/2019/dsa-4406.wml b/korean/security/2019/dsa-4406.wml
deleted file mode 100644
index 33024feea71..00000000000
--- a/korean/security/2019/dsa-4406.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="17ad00a8e0aa7e57608e532137ace459e664757f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Francis McBratney discovered that the Windows Azure Linux Agent created
-swap files with world-readable permissions, resulting in information
-disclosure.</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전2.2.18-3~deb9u2에서 수정했습니다.
-</p>
-
-<p>waagent 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>waagent의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/waagent">https://security-tracker.debian.org/tracker/waagent</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4406.data"
diff --git a/korean/security/2019/dsa-4421.wml b/korean/security/2019/dsa-4421.wml
deleted file mode 100644
index 0b7177aec0f..00000000000
--- a/korean/security/2019/dsa-4421.wml
+++ /dev/null
@@ -1,89 +0,0 @@
-#use wml::debian::translation-check translation="5357ead7bb298e3857977fea7b0087543c6072b3" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 chromium 웹 브라우저에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5787">CVE-2019-5787</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5788">CVE-2019-5788</a>
-
- <p>Mark Brand discovered a use-after-free issue in the FileAPI
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5789">CVE-2019-5789</a>
-
- <p>Mark Brand discovered a use-after-free issue in the WebMIDI
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5790">CVE-2019-5790</a>
-
- <p>Dimitri Fourny discovered a buffer overflow issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5791">CVE-2019-5791</a>
-
- <p>Choongwoo Han discovered a type confusion issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5792">CVE-2019-5792</a>
-
- <p>pdknsk discovered an integer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5793">CVE-2019-5793</a>
-
- <p>Jun Kokatsu discovered a permissions issue in the Extensions
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5794">CVE-2019-5794</a>
-
- <p>Juno Im of Theori discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5795">CVE-2019-5795</a>
-
- <p>pdknsk discovered an integer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5796">CVE-2019-5796</a>
-
- <p>Mark Brand discovered a race condition in the Extensions implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5797">CVE-2019-5797</a>
-
- <p>Mark Brand discovered a race condition in the DOMStorage implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5798">CVE-2019-5798</a>
-
- <p>Tran Tien Hung discovered an out-of-bounds read issue in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5799">CVE-2019-5799</a>
-
- <p>sohalt discovered a way to bypass the Content Security Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5800">CVE-2019-5800</a>
-
- <p>Jun Kokatsu discovered a way to bypass the Content Security Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5802">CVE-2019-5802</a>
-
- <p>Ronni Skansing discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5803">CVE-2019-5803</a>
-
- <p>Andrew Comminos discovered a way to bypass the Content Security Policy.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 73.0.3683.75-1~deb9u1에서 수정했습니다.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium">https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4421.data"
diff --git a/korean/security/2019/dsa-4422.wml b/korean/security/2019/dsa-4422.wml
deleted file mode 100644
index e4493977b95..00000000000
--- a/korean/security/2019/dsa-4422.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-#use wml::debian::translation-check translation="9bf43d9ebe1fe8f0f648cd5c0431b530d1105d92" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 아파치 HTTP 서버에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17189">CVE-2018-17189</a>
-
- <p>Gal Goldshtein of F5 Networks discovered a denial of service
- vulnerability in mod_http2. By sending malformed requests, the
- http/2 stream for that request unnecessarily occupied a server
- thread cleaning up incoming data, resulting in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17199">CVE-2018-17199</a>
-
- <p>Diego Angulo from ImExHS discovered that mod_session_cookie does not
- respect expiry time.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0196">CVE-2019-0196</a>
-
- <p>Craig Young discovered that the http/2 request handling in mod_http2
- could be made to access freed memory in string comparison when
- determining the method of a request and thus process the request
- incorrectly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0211">CVE-2019-0211</a>
-
- <p>Charles Fol discovered a privilege escalation from the
- less-privileged child process to the parent process running as root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0217">CVE-2019-0217</a>
-
- <p>A race condition in mod_auth_digest when running in a threaded
- server could allow a user with valid credentials to authenticate
- using another username, bypassing configured access control
- restrictions. The issue was discovered by Simon Kappel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0220">CVE-2019-0220</a>
-
- <p>Bernhard Lorenz of Alpha Strike Labs GmbH reported that URL
- normalizations were inconsistently handled. When the path component
- of a request URL contains multiple consecutive slashes ('/'),
- directives such as LocationMatch and RewriteRule must account for
- duplicates in regular expressions while other aspects of the servers
- processing will implicitly collapse them.</p></li>
-
-</ul>
-
-<p>안정배포(stretch)에서 이 문제를 버전 2.4.25-3+deb9u7에서 수정했습니다.
-</p>
-
-<p>이 업데이트는 다음 안정 포인트 릴리스에 넣기로 계획된 버그 픽스도 포함합니다.
-이것은 버전 2.4.25-3+deb9u6에서 보안 수정에 의한 회귀용 수정을 포함합니다.</p>
-
-<p>apache2 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>apache2의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오: <a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4422.data"
diff --git a/korean/security/2019/dsa-4424.wml b/korean/security/2019/dsa-4424.wml
deleted file mode 100644
index f81b0606eb8..00000000000
--- a/korean/security/2019/dsa-4424.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="b7e2c7807e6fd5aaf84631fa7e99673c76b652c6" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Adam Dobrawy, Frederico Silva and Gregory Brzeski from HyperOne.com
-discovered that pdns, an authoritative DNS server, did not properly
-validate user-supplied data when building a HTTP request from a DNS
-query in the HTTP Connector of the Remote backend. This would allow a
-remote user to cause either a denial-of-service, or information
-disclosure.</p>
-
-<p>안정배포(stretch)에서 이 문제를 버전 4.0.3-1+deb9u4에서 수정했습니다.</p>
-
-<p>pdns 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>pdns의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/pdns">\
-https://security-tracker.debian.org/tracker/pdns</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4424.data"
diff --git a/korean/security/2019/dsa-4427.wml b/korean/security/2019/dsa-4427.wml
deleted file mode 100644
index 80c617321a2..00000000000
--- a/korean/security/2019/dsa-4427.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="b9016a0a51d02f1349d102b798c8e447d768b1ce" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Michael Hanselmann discovered that Samba, a SMB/CIFS file, print, and
-login server for Unix, was vulnerable to a symlink traversal
-attack. It would allow remote authenticated users with write
-permission to either write or detect files outside of Samba shares.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2:4.5.16+dfsg-1+deb9u1에서 수정했습니다.</p>
-
-<p>samba 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>samba의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/samba">\
-https://security-tracker.debian.org/tracker/samba</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4427.data"
diff --git a/korean/security/2019/dsa-4428.wml b/korean/security/2019/dsa-4428.wml
deleted file mode 100644
index 7d6b60f2c7d..00000000000
--- a/korean/security/2019/dsa-4428.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="9969b1c993a42ac9607c8814c1e94d4e5a39712e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn discovered that the PAM module in systemd insecurely uses the
-environment and lacks seat verification permitting spoofing an active
-session to PolicyKit. A remote attacker with SSH access can take
-advantage of this issue to gain PolicyKit privileges that are normally
-only granted to clients in an active session on the local console.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 232-25+deb9u11에서 수정했습니다.</p>
-
-<p>이 업데이트는 stretch 9.9 포인트 릴리스에 나올 것으로 이전에 계획된 업데이트를 포함합니다.</p>
-
-<p>systemd 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>systemd의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/systemd">https://security-tracker.debian.org/tracker/systemd</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4428.data"
diff --git a/korean/security/2019/dsa-4430.wml b/korean/security/2019/dsa-4430.wml
deleted file mode 100644
index 4b5221d926a..00000000000
--- a/korean/security/2019/dsa-4430.wml
+++ /dev/null
@@ -1,70 +0,0 @@
-#use wml::debian::translation-check translation="8f89f4f84d1b72c6872f117662668a6e94dbb51a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University &amp; KU Leuven) found
-multiple vulnerabilities in the WPA implementation found in wpa_supplication
-(station) and hostapd (access point). These vulnerability are also collectively
-known as <q>Dragonblood</q>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9495">CVE-2019-9495</a>
-
- <p>Cache-based side-channel attack against the EAP-pwd implementation: an
- attacker able to run unprivileged code on the target machine (including for
- example javascript code in a browser on a smartphone) during the handshake
- could deduce enough information to discover the password in a dictionary
- attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9497">CVE-2019-9497</a>
-
- <p>Reflection attack against EAP-pwd server implementation: a lack of
- validation of received scalar and elements value in the EAP-pwd-Commit
- messages could result in attacks that would be able to complete EAP-pwd
- authentication exchange without the attacker having to know the password.
- This does not result in the attacker being able to derive the session key,
- complete the following key exchange and access the network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9498">CVE-2019-9498</a>
-
- <p>EAP-pwd server missing commit validation for scalar/element: hostapd
- doesn't validate values received in the EAP-pwd-Commit message, so an
- attacker could use a specially crafted commit message to manipulate the
- exchange in order for hostapd to derive a session key from a limited set of
- possible values. This could result in an attacker being able to complete
- authentication and gain access to the network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9499">CVE-2019-9499</a>
-
- <p>EAP-pwd peer missing commit validation for scalar/element: wpa_supplicant
- doesn't validate values received in the EAP-pwd-Commit message, so an
- attacker could use a specially crafted commit message to manipulate the
- exchange in order for wpa_supplicant to derive a session key from a limited
- set of possible values. This could result in an attacker being able to
- complete authentication and operate as a rogue AP.</p>
-
-</ul>
-
-<p>Note that the Dragonblood moniker also applies to
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-9494">\
-CVE-2019-9494</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2014-9496">\
-CVE-2014-9496</a> which are vulnerabilities in the SAE protocol in WPA3. SAE is not
-enabled in Debian stretch builds of wpa, which is thus not vulnerable by default.</p>
-
-<p>Due to the complexity of the backporting process, the fix for these
-vulnerabilities are partial. Users are advised to use strong passwords to
-prevent dictionary attacks or use a 2.7-based version from stretch-backports
-(version above 2:2.7+git20190128+0c1e29f-4).</p>
-
-<p>안정 배포(stretch)에서 이 문제를 버전 2:2.4-1+deb9u3에서 수정했습니다.</p>
-
-<p>wpa 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>wpa의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/wpa">\
-https://security-tracker.debian.org/tracker/wpa</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4430.data"
diff --git a/korean/security/2019/dsa-4432.wml b/korean/security/2019/dsa-4432.wml
deleted file mode 100644
index 0937d5917fb..00000000000
--- a/korean/security/2019/dsa-4432.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="21d9162dd33c918629dd3d402942607101fbf7fb" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Cedric Buissart discovered two vulnerabilities in Ghostscript, the GPL
-PostScript/PDF interpreter, which could result in bypass of file system
-restrictions of the dSAFER sandbox.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 9.26a~dfsg-0+deb9u2에서 수정했습니다.
-version 9.26a~dfsg-0+deb9u2.</p>
-
-<p>ghostscript 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ghostscript의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4432.data"
diff --git a/korean/security/2019/dsa-4433.wml b/korean/security/2019/dsa-4433.wml
deleted file mode 100644
index 1fcf3eda560..00000000000
--- a/korean/security/2019/dsa-4433.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="75b8ebea04c21e1a6bb52ee0d143001588e654e9" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Rubygems included in
-the interpreter for the Ruby language, which may result in denial of
-service or the execution of arbitrary code.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.3.3-1+deb9u6에서 수정했습니다.
-</p>
-
-<p>ruby2.3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ruby2.3의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ruby2.3">\
-https://security-tracker.debian.org/tracker/ruby2.3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4433.data"
diff --git a/korean/security/2019/dsa-4434.wml b/korean/security/2019/dsa-4434.wml
deleted file mode 100644
index 3f952ee0c85..00000000000
--- a/korean/security/2019/dsa-4434.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1d70d68aed7f00d7e027bb68f1495d0878857e76" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A cross-site scripting vulnerability has been found in Drupal, a
-fully-featured content management framework. For additional information,
-please refer to the upstream advisory at
-<a href="https://www.drupal.org/sa-core-2019-006">https://www.drupal.org/sa-core-2019-006</a> .</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 7.52-2+deb9u8에서 수정했습니다.</p>
-
-<p>drupal7 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>drupal7의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/drupal7">https://security-tracker.debian.org/tracker/drupal7</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4434.data"
diff --git a/korean/security/2019/dsa-4435.wml b/korean/security/2019/dsa-4435.wml
deleted file mode 100644
index ceccc52f96c..00000000000
--- a/korean/security/2019/dsa-4435.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="cc460a2de5942ef6a479acae5a9530660672cf7d" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free vulnerability was discovered in the png_image_free()
-function in the libpng PNG library, which could lead to denial of
-service or potentially the execution of arbitrary code if a malformed
-image is processed.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1.6.28-1+deb9u1에서 수정했습니다.</p>
-
-<p>libpng1.6 패키지를 업그레이드하는 게 좋습니다.</p>
-
-<p>libpng1.6의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libpng1.6">https://security-tracker.debian.org/tracker/libpng1.6</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4435.data"
diff --git a/korean/security/2019/dsa-4436.wml b/korean/security/2019/dsa-4436.wml
deleted file mode 100644
index 8859af63324..00000000000
--- a/korean/security/2019/dsa-4436.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="9865dbf22490e686686c9029e7ebd514d546a496" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>This update fixes two vulnerabilities in Imagemagick: Memory handling
-problems and missing or incomplete input sanitising may result in denial
-of service, memory disclosure or the execution of arbitrary code if
-malformed TIFF or Postscript files are processed.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 8:6.9.7.4+dfsg-11+deb9u7에서 수정했습니다.</p>
-
-<p>imagemagick 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>imagemagick의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4436.data"
diff --git a/korean/security/2019/dsa-4438.wml b/korean/security/2019/dsa-4438.wml
deleted file mode 100644
index a2e66b15901..00000000000
--- a/korean/security/2019/dsa-4438.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="5024841ed4d1abac861623d4bd54469103b6bf89" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Denis Andzakovic discovered two vulnerabilities in atftp, the advanced
-TFTP server which could result in denial of service by sending malformed
-packets.</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 0.7.git20120829-3.1~deb9u1에서 수정했습니다.</p>
-
-<p>atftp 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>atftp의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/atftp">https://security-tracker.debian.org/tracker/atftp</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4438.data"
diff --git a/korean/security/2019/dsa-4439.wml b/korean/security/2019/dsa-4439.wml
deleted file mode 100644
index 453273409fb..00000000000
--- a/korean/security/2019/dsa-4439.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="1b2caf25933bc6a22e87eebd88e23bb4dbe13167" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Dean Rasheed discovered that row security policies in the PostgreSQL
-database system could be bypassed.</p>
-
-<p>For additional information please refer to the upstream announcement
-at <a href="https://www.postgresql.org/about/news/1939/">\
-https://www.postgresql.org/about/news/1939/</a></p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 9.6.13-0+deb9u1에서 수정했습니다.</p>
-
-<p>postgresql-9.6 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>postgresql-9.6의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">\
-https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4439.data"
diff --git a/korean/security/2019/dsa-4440.wml b/korean/security/2019/dsa-4440.wml
deleted file mode 100644
index 34e602f3568..00000000000
--- a/korean/security/2019/dsa-4440.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-#use wml::debian::translation-check translation="45c7a748884ba819e8e43a8bafa9c7b0a2629b5a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 BIND DNS server에서 발견했습니다:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5743">CVE-2018-5743</a>
-
- <p>Connection limits were incorrectly enforced.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5745">CVE-2018-5745</a>
-
- <p>The "managed-keys" feature was susceptible to denial of service by
- triggering an assert.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6465">CVE-2019-6465</a>
-
- <p>ACLs for zone transfers were incorrectly enforced for dynamically
- loadable zones (DLZs).</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1:9.10.3.dfsg.P4-12.3+deb9u5에서 수정했습니다.</p>
-
-<p>bind9 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>bind9의 자세한 보안상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/bind9">\
-https://security-tracker.debian.org/tracker/bind9</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4440.data"
diff --git a/korean/security/2019/dsa-4441.wml b/korean/security/2019/dsa-4441.wml
deleted file mode 100644
index 321932487d4..00000000000
--- a/korean/security/2019/dsa-4441.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="ad71d519730a7a7c0864574c9600084cf26d9d45" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the Symfony PHP framework
-which could lead to cache bypass, authentication bypass, information
-disclosure, open redirect, cross-site request forgery, deletion of
-arbitrary files, or arbitrary code execution.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.8.7+dfsg-1.3+deb9u2에서 수정했습니다.</p>
-
-<p>symfony 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>symfony의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/symfony">\
-https://security-tracker.debian.org/tracker/symfony</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4441.data"
diff --git a/korean/security/2019/dsa-4443.wml b/korean/security/2019/dsa-4443.wml
deleted file mode 100644
index 551307c55b1..00000000000
--- a/korean/security/2019/dsa-4443.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="e9576c021a0fbd38170055312fb39566c40a3971" maintainer="sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Isaac Boukris and Andrew Bartlett discovered that the S4U2Self Kerberos
-extension used in Samba's Active Directory support was susceptible to
-man-in-the-middle attacks caused by incomplete checksum validation.</p>
-
-<p>Details can be found in the upstream advisory at
-<url "https://www.samba.org/samba/security/CVE-2018-16860.html" /></p>
-
-<p>안정 배포(stretch)에서,
-이 문제를 버전 2:4.5.16+dfsg-1+deb9u2에서 수정했습니다.</p>
-
-<p>samba 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>samba의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/samba">\
-https://security-tracker.debian.org/tracker/samba</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4443.data"
diff --git a/korean/security/2019/dsa-4444.wml b/korean/security/2019/dsa-4444.wml
deleted file mode 100644
index 232f7eb97f4..00000000000
--- a/korean/security/2019/dsa-4444.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-#use wml::debian::translation-check translation="42b6b660e613679ceb4726fb1a5aebaa47b68d96" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple researchers have discovered vulnerabilities in the way the
-Intel processor designs have implemented speculative forwarding of data
-filled into temporary microarchitectural structures (buffers). This
-flaw could allow an attacker controlling an unprivileged process to
-read sensitive information, including from the kernel and all other
-processes running on the system or cross guest/host boundaries to read
-host memory.</p>
-
-<p>자세한 것은 <a href="https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html">\
-https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html</a>를
-보세요.</p>
-
-<p>To fully resolve these vulnerabilities it is also necessary to install
-updated CPU microcode. An updated intel-microcode package (only
-available in Debian non-free) will be provided via a separate DSA. The
-updated CPU microcode may also be available as part of a system firmware
-("BIOS") update.</p>
-
-<p>In addition, this update includes a fix for a regression causing
-deadlocks inside the loopback driver, which was introduced by the update
-to 4.9.168 in the last Stretch point release.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전4.9.168-1+deb9u2에서 수정했습니다.</p>
-
-<p>linux 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>linux의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/linux">\
-https://security-tracker.debian.org/tracker/linux</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4444.data"
diff --git a/korean/security/2019/dsa-4454.wml b/korean/security/2019/dsa-4454.wml
deleted file mode 100644
index 7b32e554d63..00000000000
--- a/korean/security/2019/dsa-4454.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="07dbe48ebf344016ca85c4138ca2e39aad7d3ea7" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in QEMU, a fast processor
-emulator, which could result in denial of service, the execution of
-arbitrary code or information disclosure.</p>
-
-<p>In addition this update backports support to passthrough the new
-md-clear CPU flag added in the intel-microcode update shipped in DSA 4447
-to x86-based guests.</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 1:2.8+dfsg-6+deb9u6에서 수정했습니다.</p>
-
-<p>qemu 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>qemu의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/qemu">\
-https://security-tracker.debian.org/tracker/qemu</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4454.data"
diff --git a/korean/security/2019/dsa-4455.wml b/korean/security/2019/dsa-4455.wml
deleted file mode 100644
index a08567d8073..00000000000
--- a/korean/security/2019/dsa-4455.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-#use wml::debian::translation-check translation="1cd443bbff5c5f8e18b9961d25d41c997d4a4103" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 Heimdal에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16860">CVE-2018-16860</a>
-
- <p>Isaac Boukris and Andrew Bartlett discovered that Heimdal was
- susceptible to man-in-the-middle attacks caused by incomplete
- checksum validation. Details on the issue can be found in the Samba
- advisory at <a href="https://www.samba.org/samba/security/CVE-2018-16860.html">\
- https://www.samba.org/samba/security/CVE-2018-16860.html</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12098">CVE-2019-12098</a>
-
- <p>It was discovered that failure of verification of the PA-PKINIT-KX key
- exchange client-side could permit to perform man-in-the-middle attack.</p></li>
-
-</ul>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 7.1.0+dfsg-13+deb9u3에서 수정했습니다.</p>
-
-<p>heimdal 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>heimdal의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/heimdal">\
-https://security-tracker.debian.org/tracker/heimdal</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4455.data"
diff --git a/korean/security/2019/dsa-4457.wml b/korean/security/2019/dsa-4457.wml
deleted file mode 100644
index 67dbd959a19..00000000000
--- a/korean/security/2019/dsa-4457.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="05090161b60513a52deaff861edb44977d533329" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Hanno Böck discovered that Evolution was vulnerable to OpenPGP
-signatures being spoofed for arbitrary messages using a specially
-crafted HTML email. This issue was mitigated by moving the security
-bar with encryption and signature information above the message
-headers.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 3.22.6-1+deb9u2에서 수정했습니다.</p>
-
-<p>evolution 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>evolution의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/evolution">\
-https://security-tracker.debian.org/tracker/evolution</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4457.data"
diff --git a/korean/security/2019/dsa-4458.wml b/korean/security/2019/dsa-4458.wml
deleted file mode 100644
index 1d53d43fc26..00000000000
--- a/korean/security/2019/dsa-4458.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="211753aad2cf271463097d5140cd55a2e3f914a6" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in the CalDAV feature in httpd of the Cyrus IMAP
-server, leading to denial of service or potentially the execution of
-arbitrary code via a crafted HTTP PUT operation for an event with a long
-iCalendar property name.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.5.10-3+deb9u1에서 수정했습니다.</p>
-
-<p>cyrus-imapd 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>cyrus-imapd의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/cyrus-imapd">https://security-tracker.debian.org/tracker/cyrus-imapd</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4458.data"
diff --git a/korean/security/2019/dsa-4462.wml b/korean/security/2019/dsa-4462.wml
deleted file mode 100644
index bb28a25d496..00000000000
--- a/korean/security/2019/dsa-4462.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-#use wml::debian::translation-check translation="24c857ab9e9769817510eaee4ab4860fd27c3a19" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Joe Vennix discovered an authentication bypass vulnerability in dbus, an
-asynchronous inter-process communication system. The implementation of
-the DBUS_COOKIE_SHA1 authentication mechanism was susceptible to a
-symbolic link attack. A local attacker could take advantage of this flaw
-to bypass authentication and connect to a DBusServer with elevated
-privileges.</p>
-
-<p>The standard system and session dbus-daemons in their default
-configuration are not affected by this vulnerability.</p>
-
-<p>The vulnerability was addressed by upgrading dbus to a new upstream
-version 1.10.28 which includes additional fixes.</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 1.10.28-0+deb9u1에서 수정했습니다.</p>
-
-<p>dbus 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>dbus의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/dbus">https://security-tracker.debian.org/tracker/dbus</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4462.data"
diff --git a/korean/security/2019/dsa-4463.wml b/korean/security/2019/dsa-4463.wml
deleted file mode 100644
index ad9b9e015c0..00000000000
--- a/korean/security/2019/dsa-4463.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="af7b203527ee1b8555d0442bb1657b6a2be1a224" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in the ZNC IRC bouncer which could
-result in remote code execution (<a href="https://security-tracker.debian.org/tracker/CVE-2019-12816">CVE-2019-12816</a>) or denial of service
-via invalid encoding (<a href="https://security-tracker.debian.org/tracker/CVE-2019-9917">CVE-2019-9917</a>).</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 1.6.5-1+deb9u2에서 수정했습니다.</p>
-
-<p>znc 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>znc의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/znc">https://security-tracker.debian.org/tracker/znc</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4463.data"
diff --git a/korean/security/2019/dsa-4464.wml b/korean/security/2019/dsa-4464.wml
deleted file mode 100644
index 63b815f8100..00000000000
--- a/korean/security/2019/dsa-4464.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="dc9deb42461982438599778b22d024213ff3cb11" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which may lead
-to the execution of arbitrary code if malformed email messages are read.</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 1:60.7.1-1~deb9u1에서 수정했습니다.</p>
-
-<p>thunderbird 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>thunderbird의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">\
-https://security-tracker.debian.org/tracker/thunderbird</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4464.data"
diff --git a/korean/security/2019/dsa-4466.wml b/korean/security/2019/dsa-4466.wml
deleted file mode 100644
index e9b87c71ce6..00000000000
--- a/korean/security/2019/dsa-4466.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="33b97c7ed0c12c7701cad4a8987c6d47e6617846" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Samuel Gross discovered a type confusion bug in the JavaScript engine of
-the Mozilla Firefox web browser, which could result in the execution of
-arbitrary code when browsing a malicious website.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 60.7.1esr-1~deb9u1에서 수정했습니다.</p>
-
-<p>firefox-esr 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>firefox-esr의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4466.data"
diff --git a/korean/security/2019/dsa-4467.wml b/korean/security/2019/dsa-4467.wml
deleted file mode 100644
index a91350bafab..00000000000
--- a/korean/security/2019/dsa-4467.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="a0d25d78b2c207b5e643fbc99f4957ec35c99fda" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>User <q>Arminius</q> discovered a vulnerability in Vim, an enhanced version of the
-standard UNIX editor Vi (Vi IMproved). The <q>Common vulnerabilities and
-exposures project</q> identifies the following problem:</p>
-
-<p>Editors typically provide a way to embed editor configuration commands (aka
-modelines) which are executed once a file is opened, while harmful commands
-are filtered by a sandbox mechanism. It was discovered that the <q>source</q>
-command (used to include and execute another file) was not filtered, allowing
-shell command execution with a carefully crafted file opened in Vim.</p>
-
-<p>For the stable distribution 안정배포(stretch)에서, 이 문제를 버전 2:8.0.0197-4+deb9u2에서 수정했습니다.</p>
-
-<p>vim 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>vim의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/vim">\
-https://security-tracker.debian.org/tracker/vim</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4467.data"
diff --git a/korean/security/2019/dsa-4468.wml b/korean/security/2019/dsa-4468.wml
deleted file mode 100644
index 6e70bf93e34..00000000000
--- a/korean/security/2019/dsa-4468.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="c86d1b16df378fc0e230b32c2fd342bdb4f859b9" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안업데이트</define-tag>
-<define-tag moreinfo>
-<p>A path traversal vulnerability due to an unsanitized POST parameter was
-discovered in php-horde-form, a package providing form rendering,
-validation, and other functionality for the Horde Application Framework.
-An attacker can take advantage of this flaw for remote code execution.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.0.15-1+deb9u1에서 수정했습니다.</p>
-
-<p>php-horde-form 패키지 업그레이드 권합니다.</p>
-
-<p>php-horde-form의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php-horde-form">https://security-tracker.debian.org/tracker/php-horde-form</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4468.data"
diff --git a/korean/security/2019/dsa-4472.wml b/korean/security/2019/dsa-4472.wml
deleted file mode 100644
index 597b21f6006..00000000000
--- a/korean/security/2019/dsa-4472.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="f24aa5af4e55c55e5546cc0e182d5149dcbf12b0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Expat, an XML parsing C library, did not properly
-handled XML input including XML names that contain a large number of
-colons, potentially resulting in denial of service.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 2.2.0-2+deb9u2에서 수정했습니다.</p>
-
-<p>expat 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>expat의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/expat">https://security-tracker.debian.org/tracker/expat</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4472.data"
diff --git a/korean/security/2019/dsa-4473.wml b/korean/security/2019/dsa-4473.wml
deleted file mode 100644
index fd09110f385..00000000000
--- a/korean/security/2019/dsa-4473.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="83d0c691f779c15a21f02adac794ff68e68a1f14" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in the rdesktop RDP client, which
-could result in denial of service and the execution of arbitrary code.</p>
-
-<p>안정배포(stretch)에서, 이 문제를 버전 1.8.6-2~deb9u1에서 수정했습니다.</p>
-
-<p>rdesktop 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>rdesktop의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/rdesktop">\
-https://security-tracker.debian.org/tracker/rdesktop</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4473.data"
diff --git a/korean/security/2019/dsa-4474.wml b/korean/security/2019/dsa-4474.wml
deleted file mode 100644
index bbb4f3e7ec4..00000000000
--- a/korean/security/2019/dsa-4474.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="b27bc2036d776d68cce44083f71f8b58fd712902" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A sandbox escape was found in the Mozilla Firefox web browser, which
-could potentially result in the execution of arbitrary code if
-combined with additional vulnerabilities.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 60.7.2esr-1~deb9u1에서 수정했습니다.</p>
-
-<p>firefox-esr 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>firefox-esr의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4474.data"
diff --git a/korean/security/2019/dsa-4475.wml b/korean/security/2019/dsa-4475.wml
deleted file mode 100644
index 8d956fc2211..00000000000
--- a/korean/security/2019/dsa-4475.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="aeeaf339a8d997a10158499aedcffe4ec71a7d78" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Joran Dirk Greef discovered that overly long nonces used with
-ChaCha20-Poly1305 were incorrectly processed and could result in nonce
-reuse. This doesn't affect OpenSSL-internal uses of ChaCha20-Poly1305
-such as TLS.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1.1.0k-1~deb9u1에서 수정했습니다. This DSA also upgrades openssl1.0 (which
-itself is not affected by <a href="https://security-tracker.debian.org/tracker/CVE-2019-1543">\
-CVE-2019-1543</a>) to 1.0.2s-1~deb9u1</p>
-
-<p>openssl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>openssl의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/openssl">\
-https://security-tracker.debian.org/tracker/openssl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4475.data"
diff --git a/korean/security/2019/dsa-4476.wml b/korean/security/2019/dsa-4476.wml
deleted file mode 100644
index c2dbd186a5d..00000000000
--- a/korean/security/2019/dsa-4476.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="bd92c39f28574e486970de3a58c1be71ac0f09ad" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Three security issues were found in Django, a Python web development
-framework, which could result in denial of service, incomplete
-sanitisation of clickable links or missing redirects of HTTP requests
-to HTTPS.</p>
-
-<p>안정 배포(stretch)에서, 이 문제를 버전 1:1.10.7-2+deb9u5에서 수정했습니다.</p>
-
-<p>python-django 패키지를 업그레이드하는 게 좋습니다.</p>
-
-<p>python-django의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-django">\
-https://security-tracker.debian.org/tracker/python-django</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4476.data"
diff --git a/korean/security/2019/dsa-4477.wml b/korean/security/2019/dsa-4477.wml
deleted file mode 100644
index 979e8c4eeeb..00000000000
--- a/korean/security/2019/dsa-4477.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="0a1bc44b89e0fffc2994c5f3135054e8022f0b4a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Fang-Pen Lin discovered a stack-based buffer-overflow flaw in ZeroMQ, a
-lightweight messaging kernel library. A remote, unauthenticated client
-connecting to an application using the libzmq library, running with a
-socket listening with CURVE encryption/authentication enabled, can take
-advantage of this flaw to cause a denial of service or the execution of
-arbitrary code.</p>
-
-<p>옛 안정 배포(stretch)에서, 이 문제를 버전 4.2.1-4+deb9u2에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 4.3.1-4+deb10u1에서 수정했습니다.</p>
-
-<p>zeromq3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>zeromq3의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/zeromq3">https://security-tracker.debian.org/tracker/zeromq3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4477.data"
diff --git a/korean/security/2019/dsa-4481.wml b/korean/security/2019/dsa-4481.wml
deleted file mode 100644
index 8ecb42b8f48..00000000000
--- a/korean/security/2019/dsa-4481.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="25077367f7fd816cf900e26c85e197be2c59517a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Harsh Jaiswal discovered a remote shell execution vulnerability in
-ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick
-or GraphicsMagick, exploitable when using MiniMagick::Image.open with
-specially crafted URLs coming from unsanitized user input.</p>
-
-<p>옛 안정배포(stretch)에서, 이 문제를 버전 4.5.1-1+deb9u1에서 수정했습니다.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 4.9.2-1+deb10u1에서 수정했습니다.</p>
-
-<p>ruby-mini-magick 패키지를 업그레이드하는 게 좋습니다.</p>
-
-<p>ruby-mini-magick의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ruby-mini-magick">https://security-tracker.debian.org/tracker/ruby-mini-magick</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4481.data"
diff --git a/korean/security/2019/dsa-4484.wml b/korean/security/2019/dsa-4484.wml
deleted file mode 100644
index 28aad9d2866..00000000000
--- a/korean/security/2019/dsa-4484.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="1ac8218b729e6fe62e8b52eb754400fe4a637557" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn discovered that the ptrace subsystem in the Linux kernel
-mishandles the management of the credentials of a process that wants to
-create a ptrace relationship, allowing a local user to obtain root
-privileges under certain scenarios.</p>
-
-<p>For the oldstable distribution 옛안정 배포(stretch)에서, 이 문제를 버전 4.9.168-1+deb9u4에서 수정했습니다.</p>
-
-<p>For the stable distribution 안정 배포(buster)에서, 이 문제를 버전 4.19.37-5+deb10u1에서 수정했습니다. 이 업데이트는 또
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-11478">CVE-2019-11478</a>에 대한 회기 패치도 포함합니다 (#930904).</p>
-
-<p>linux 패키지를 업그레이드하는 게 좋습니다.</p>
-
-<p>linux의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4484.data"
diff --git a/korean/security/2019/dsa-4490.wml b/korean/security/2019/dsa-4490.wml
deleted file mode 100644
index 8b2e91fdcff..00000000000
--- a/korean/security/2019/dsa-4490.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-#use wml::debian::translation-check translation="bbdc5fdd9cf31c8e006e51f38f90961f3cb78f42" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Subversion, a version control
-system. The Common Vulnerabilities and Exposures project identifies the
-following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11782">CVE-2018-11782</a>
-
- <p>Ace Olszowka reported that the Subversion's svnserve server process
- may exit when a well-formed read-only request produces a particular
- answer, leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0203">CVE-2019-0203</a>
-
- <p>Tomas Bortoli reported that the Subversion's svnserve server process
- may exit when a client sends certain sequences of protocol commands.
- If the server is configured with anonymous access enabled this could
- lead to a remote unauthenticated denial of service.</p></li>
-
-</ul>
-
-<p>옛 안정배포(stretch)에서, 이 문제를 버전 1.9.5-1+deb9u4에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 1.10.4-1+deb10u1에서 수정했습니다.</p>
-
-<p>subversion 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>subversion의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/subversion">https://security-tracker.debian.org/tracker/subversion</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4490.data"
diff --git a/korean/security/2019/dsa-4494.wml b/korean/security/2019/dsa-4494.wml
deleted file mode 100644
index 61b1c78ff9d..00000000000
--- a/korean/security/2019/dsa-4494.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="e2a0febe5662aba5663827024c6257324ba5d9bd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Dominik Penner discovered that KConfig, the KDE configuration settings
-framework, supported a feature to define shell command execution in
-.desktop files. If a user is provided with a malformed .desktop file
-(e.g. if it's embedded into a downloaded archive and it gets opened in
-a file browser) arbitrary commands could get executed. This update
-removes this feature.</p>
-
-<p>옛 안정 배포(stretch)에서, 이 문제를 버전 5.28.0-2+deb9u1에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 5.54.0-1+deb10u1에서 수정했습니다.</p>
-
-<p>kconfig 패키지 업그레이드 권합니다.</p>
-
-<p>kconfig 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/kconfig">\
-https://security-tracker.debian.org/tracker/kconfig</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4494.data"
diff --git a/korean/security/2019/dsa-4499.wml b/korean/security/2019/dsa-4499.wml
deleted file mode 100644
index b8c8a54ea08..00000000000
--- a/korean/security/2019/dsa-4499.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="65aeebeeb680b006b7abd280632468d607d2602f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Netanel reported that the .buildfont1 procedure in Ghostscript, the GPL
-PostScript/PDF interpreter, does not properly restrict privileged calls,
-which could result in bypass of file system restrictions of the dSAFER
-sandbox.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 9.26a~dfsg-0+deb9u4.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 9.27~dfsg-2+deb10u1에서 수정했습니다.</p>
-
-<p>ghostscript 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ghostscript의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4499.data"
diff --git a/korean/security/2019/dsa-4500.wml b/korean/security/2019/dsa-4500.wml
deleted file mode 100644
index f222ab1ac6a..00000000000
--- a/korean/security/2019/dsa-4500.wml
+++ /dev/null
@@ -1,246 +0,0 @@
-#use wml::debian::translation-check translation="5a7e8817234aa390e4384f1dc8504b8534ccf81e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 chromium 웹 브라우저에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5805">CVE-2019-5805</a>
-
- <p>A use-after-free issue was discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5806">CVE-2019-5806</a>
-
- <p>Wen Xu discovered an integer overflow issue in the Angle library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5807">CVE-2019-5807</a>
-
- <p>TimGMichaud discovered a memory corruption issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5808">CVE-2019-5808</a>
-
- <p>cloudfuzzer discovered a use-after-free issue in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5809">CVE-2019-5809</a>
-
- <p>Mark Brand discovered a use-after-free issue in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5810">CVE-2019-5810</a>
-
- <p>Mark Amery discovered an information disclosure issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5811">CVE-2019-5811</a>
-
- <p>Jun Kokatsu discovered a way to bypass the Cross-Origin Resource Sharing
- feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5813">CVE-2019-5813</a>
-
- <p>Aleksandar Nikolic discovered an out-of-bounds read issue in the v8
- javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5814">CVE-2019-5814</a>
-
- <p>@AaylaSecura1138 discovered a way to bypass the Cross-Origin Resource
- Sharing feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5815">CVE-2019-5815</a>
-
- <p>Nicolas Grégoire discovered a buffer overflow issue in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5818">CVE-2019-5818</a>
-
- <p>Adrian Tolbaru discovered an uninitialized value issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5819">CVE-2019-5819</a>
-
- <p>Svyat Mitin discovered an error in the developer tools.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5820">CVE-2019-5820</a>
-
- <p>pdknsk discovered an integer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5821">CVE-2019-5821</a>
-
- <p>pdknsk discovered another integer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5822">CVE-2019-5822</a>
-
- <p>Jun Kokatsu discovered a way to bypass the Cross-Origin Resource Sharing
- feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5823">CVE-2019-5823</a>
-
- <p>David Erceg discovered a navigation error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5824">CVE-2019-5824</a>
-
- <p>leecraso and Guang Gong discovered an error in the media player.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5825">CVE-2019-5825</a>
-
- <p>Genming Liu, Jianyu Chen, Zhen Feng, and Jessica Liu discovered an
- out-of-bounds write issue in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5826">CVE-2019-5826</a>
-
- <p>Genming Liu, Jianyu Chen, Zhen Feng, and Jessica Liu discovered a
- use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5827">CVE-2019-5827</a>
-
- <p>mlfbrown discovered an out-of-bounds read issue in the sqlite library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5828">CVE-2019-5828</a>
-
- <p>leecraso and Guang Gong discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5829">CVE-2019-5829</a>
-
- <p>Lucas Pinheiro discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5830">CVE-2019-5830</a>
-
- <p>Andrew Krashichkov discovered a credential error in the Cross-Origin
- Resource Sharing feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5831">CVE-2019-5831</a>
-
- <p>yngwei discovered a map error in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5832">CVE-2019-5832</a>
-
- <p>Sergey Shekyan discovered an error in the Cross-Origin Resource Sharing
- feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5833">CVE-2019-5833</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5834">CVE-2019-5834</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5836">CVE-2019-5836</a>
-
- <p>Omair discovered a buffer overflow issue in the Angle library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5837">CVE-2019-5837</a>
-
- <p>Adam Iawniuk discovered an information disclosure issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5838">CVE-2019-5838</a>
-
- <p>David Erceg discovered an error in extension permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5839">CVE-2019-5839</a>
-
- <p>Masato Kinugawa discovered implementation errors in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5840">CVE-2019-5840</a>
-
- <p>Eliya Stein and Jerome Dangu discovered a way to bypass the popup blocker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5842">CVE-2019-5842</a>
-
- <p>BUGFENSE discovered a use-after-free issue in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5847">CVE-2019-5847</a>
-
- <p>m3plex discovered an error in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5848">CVE-2019-5848</a>
-
- <p>Mark Amery discovered an information disclosure issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5849">CVE-2019-5849</a>
-
- <p>Zhen Zhou discovered an out-of-bounds read in the Skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5850">CVE-2019-5850</a>
-
- <p>Brendon Tiszka discovered a use-after-free issue in the offline page
- fetcher.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5851">CVE-2019-5851</a>
-
- <p>Zhe Jin discovered a use-after-poison issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5852">CVE-2019-5852</a>
-
- <p>David Erceg discovered an information disclosure issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5853">CVE-2019-5853</a>
-
- <p>Yngwei and sakura discovered a memory corruption issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5854">CVE-2019-5854</a>
-
- <p>Zhen Zhou discovered an integer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5855">CVE-2019-5855</a>
-
- <p>Zhen Zhou discovered an integer overflow issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5856">CVE-2019-5856</a>
-
- <p>Yongke Wang discovered an error related to file system URL permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5857">CVE-2019-5857</a>
-
- <p>cloudfuzzer discovered a way to crash chromium.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5858">CVE-2019-5858</a>
-
- <p>evil1m0 discovered an information disclosure issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5859">CVE-2019-5859</a>
-
- <p>James Lee discovered a way to launch alternative browsers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5860">CVE-2019-5860</a>
-
- <p>A use-after-free issue was discovered in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5861">CVE-2019-5861</a>
-
- <p>Robin Linus discovered an error determining click location.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5862">CVE-2019-5862</a>
-
- <p>Jun Kokatsu discovered an error in the AppCache implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5864">CVE-2019-5864</a>
-
- <p>Devin Grindle discovered an error in the Cross-Origin Resourse Sharing
- feature for extensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5865">CVE-2019-5865</a>
-
- <p>Ivan Fratric discovered a way to bypass the site isolation feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5867">CVE-2019-5867</a>
-
- <p>Lucas Pinheiro discovered an out-of-bounds read issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5868">CVE-2019-5868</a>
-
- <p>banananapenguin discovered a use-after-free issue in the v8 javascript
- library.</p></li>
-
-</ul>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 76.0.3809.100-1~deb10u1에서 수정했습니다.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4500.data"
diff --git a/korean/security/2019/dsa-4509.wml b/korean/security/2019/dsa-4509.wml
deleted file mode 100644
index 9837dbea66e..00000000000
--- a/korean/security/2019/dsa-4509.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-#use wml::debian::translation-check translation="b917e690cbacd447496fcc36bb3b22df5d6873b2" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Apache HTTPD 서버에서 여러 취약점을 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9517">CVE-2019-9517</a>
-
- <p>Jonathan Looney reported that a malicious client could perform a
- denial of service attack (exhausting h2 workers) by flooding a
- connection with requests and basically never reading responses on
- the TCP connection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10081">CVE-2019-10081</a>
-
- <p>Craig Young reported that HTTP/2 PUSHes could lead to an overwrite
- of memory in the pushing request's pool, leading to crashes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10082">CVE-2019-10082</a>
-
- <p>Craig Young reported that the HTTP/2 session handling could be made
- to read memory after being freed, during connection shutdown.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10092">CVE-2019-10092</a>
-
- <p>Matei <q>Mal</q> Badanoiu reported a limited cross-site scripting
- vulnerability in the mod_proxy error page.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10097">CVE-2019-10097</a>
-
- <p>Daniel McCarney reported that when mod_remoteip was configured to
- use a trusted intermediary proxy server using the <q>PROXY</q> protocol,
- a specially crafted PROXY header could trigger a stack buffer
- overflow or NULL pointer deference. This vulnerability could only be
- triggered by a trusted proxy and not by untrusted HTTP clients. The
- issue does not affect the stretch release.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10098">CVE-2019-10098</a>
-
- <p>Yukitsugu Sasaki reported a potential open redirect vulnerability in
- the mod_rewrite module.</p></li>
-
-</ul>
-
-<p>옛안정 배포(stretch)에서, 이 문제를 버전 2.4.25-3+deb9u8에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 2.4.38-3+deb10u1에서 수정했습니다.</p>
-
-<p>apache2 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>apache2의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4509.data"
diff --git a/korean/security/2019/dsa-4510.wml b/korean/security/2019/dsa-4510.wml
deleted file mode 100644
index cfb8dff27ad..00000000000
--- a/korean/security/2019/dsa-4510.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="c1ea0c532237ebe87381e982acdfd0b88c70ad4f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Nick Roessler and Rafi Rubin discovered that the IMAP and ManageSieve
-protocol parsers in the Dovecot email server do not properly validate
-input (both pre- and post-login). A remote attacker can take advantage
-of this flaw to trigger out of bounds heap memory writes, leading to
-information leaks or potentially the execution of arbitrary code.</p>
-
-<p>옛안정 배포(stretch)에서, 이 문제를 버전 1:2.2.27-3+deb9u5에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 1:2.3.4.1-5+deb10u1에서 수정했습니다.</p>
-
-<p>dovecot 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>dovecot의 자세한 보안 상태는 보안 추척 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/dovecot">\
-https://security-tracker.debian.org/tracker/dovecot</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4510.data"
diff --git a/korean/security/2019/dsa-4517.wml b/korean/security/2019/dsa-4517.wml
deleted file mode 100644
index c57f9bd8d26..00000000000
--- a/korean/security/2019/dsa-4517.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="d557dc27d0e6c0c155f3f7ee85e1e54ee4a59e98" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>"Zerons" and Qualys discovered that a buffer overflow triggerable in the
-TLS negotiation code of the Exim mail transport agent could result in the
-execution of arbitrary code with root privileges.</p>
-
-<p>옛 안정배포(stretch)에서, 이 문제를 버전 4.89-2+deb9u6에서 수정했습니다.</p>
-
-<p>안정 배포(buster)의 안정배포에서, 이 문제를 버전 4.92-8+deb10u2에서 수정했습니다</p>
-
-<p>exim4 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>exim4의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/exim4">\
-https://security-tracker.debian.org/tracker/exim4</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4517.data"
diff --git a/korean/security/2019/dsa-4519.wml b/korean/security/2019/dsa-4519.wml
deleted file mode 100644
index b2e1ba38097..00000000000
--- a/korean/security/2019/dsa-4519.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="c7ca0a1ab69b9a860b09e5fe73e761386d8ba7fa" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the code fixes for LibreOffice to address
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-9852">\
-CVE-2019-9852</a> were not complete. Additional information can be found at
-<url "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/">.</p>
-
-<p>옛 안정 배포(stretch)에서, 이 문제를 버전 1:5.2.7-1+deb9u11에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 1:6.1.5-3+deb10u4에서 수정했습니다.</p>
-
-<p>libreoffice 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libreoffice의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libreoffice">\
-https://security-tracker.debian.org/tracker/libreoffice</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4519.data"
diff --git a/korean/security/2019/dsa-4521.wml b/korean/security/2019/dsa-4521.wml
deleted file mode 100644
index 83db1526ce7..00000000000
--- a/korean/security/2019/dsa-4521.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="47e98befc5737223dae4aac04b97842526b5c5da" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Three security vulnerabilities have been discovered in the Docker
-container runtime: Insecure loading of NSS libraries in <q>docker cp</q>
-could result in execution of code with root privileges, sensitive data
-could be logged in debug mode and there was a command injection
-vulnerability in the <q>docker build</q> command.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 18.09.1+dfsg1-7.1+deb10u1에서 수정했습니다.</p>
-
-<p>docker.io 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>docker.io의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/docker.io">\
-https://security-tracker.debian.org/tracker/docker.io</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4521.data"
diff --git a/korean/security/2019/dsa-4525.wml b/korean/security/2019/dsa-4525.wml
deleted file mode 100644
index dd74e263631..00000000000
--- a/korean/security/2019/dsa-4525.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="8d9ce2ed95e0dd5428bb16b32cf4a2c1634c4815" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Simon McVittie reported a flaw in ibus, the Intelligent Input Bus. Due
-to a misconfiguration during the setup of the DBus, any unprivileged
-user could monitor and send method calls to the ibus bus of another
-user, if able to discover the UNIX socket used by another user connected
-on a graphical environment. The attacker can take advantage of this flaw
-to intercept keystrokes of the victim user or modify input related
-configurations through DBus method calls.</p>
-
-<p>옛 안정 배포(stretch)에서, 이 문제를 버전 1.5.14-3+deb9u2에서 수정했습니다.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 1.5.19-4+deb10u1에서 수정했습니다.</p>
-
-<p>ibus 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ibus의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ibus">https://security-tracker.debian.org/tracker/ibus</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4525.data"
diff --git a/korean/security/2019/dsa-4526.wml b/korean/security/2019/dsa-4526.wml
deleted file mode 100644
index 4a9b47ad28a..00000000000
--- a/korean/security/2019/dsa-4526.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="7f4df948e9b4b013e8fa3d8bf66f33e8a1d29f1a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that OpenDMARC, a milter implementation of DMARC, is
-prone to a signature-bypass vulnerability with multiple From: addresses.</p>
-
-<p>옛 안정 배포(stretch)에서, 이 문제를 버전 1.3.2-2+deb9u2에서 수정했습니다.</p>
-
-<p>안정 배포 (buster)에서, 이 문제를 버전 1.3.2-6+deb10u1에서 수정했습니다.</p>
-
-<p>opendmarc 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>opendmarc의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/opendmarc">https://security-tracker.debian.org/tracker/opendmarc</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4526.data"
diff --git a/korean/security/2019/dsa-4527.wml b/korean/security/2019/dsa-4527.wml
deleted file mode 100644
index 5024f005df9..00000000000
--- a/korean/security/2019/dsa-4527.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="be1635e35282002f172c30fa3fa1e98ec34a66ca" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in PHP, a widely-used open source
-general purpose scripting language: Missing sanitising in the EXIF
-extension and the iconv_mime_decode_headers() function could result in
-information disclosure or denial of service.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 7.3.9-1~deb10u1에서 수정했습니다.</p>
-
-<p>php7.3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php7.3의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php7.3">\
-https://security-tracker.debian.org/tracker/php7.3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4527.data"
diff --git a/korean/security/2019/dsa-4528.wml b/korean/security/2019/dsa-4528.wml
deleted file mode 100644
index 2e566b2c175..00000000000
--- a/korean/security/2019/dsa-4528.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="3e1c8d5f42f45a73395755451ecb2c6855bad71c" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Daniel McCarney discovered that the BIRD internet routing daemon
-incorrectly validated RFC 8203 messages in it's BGP daemon, resulting
-in a stack buffer overflow.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.6.6-1+deb10u1. In addition this update fixes an incomplete
-revocation of privileges and a crash triggerable via the CLI (the latter
-two bugs are also fixed in the oldstable distribution (stretch) which is
-not affected by
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-16159">\
-CVE-2019-16159</a>).</p>
-
-<p>bird 패키지를 업데이트 하는 게 좋습니다.</p>
-
-<p>bird의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/bird">\
-https://security-tracker.debian.org/tracker/bird</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4528.data"
diff --git a/korean/security/2019/dsa-4529.wml b/korean/security/2019/dsa-4529.wml
deleted file mode 100644
index ff8ef7dff09..00000000000
--- a/korean/security/2019/dsa-4529.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="979476acbf8b1401cd8ce3a975b5a2059f687c02" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in PHP, a widely-used open source
-general purpose scripting language: Missing sanitising in the EXIF
-extension and the iconv_mime_decode_headers() function could result in
-information disclosure or denial of service.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 7.0.33-0+deb9u5.</p>
-
-<p>php7.0 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php7.0의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php7.0">https://security-tracker.debian.org/tracker/php7.0</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4529.data"
diff --git a/korean/security/2019/dsa-4530.wml b/korean/security/2019/dsa-4530.wml
deleted file mode 100644
index 0652c6d09b4..00000000000
--- a/korean/security/2019/dsa-4530.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="2d8933ae77bc3fe97abdfadbda1ff1d229d2e40e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Expat, an XML parsing C library, did not properly
-handled internal entities closing the doctype, potentially resulting in
-denial of service or information disclosure if a malformed XML file is
-processed.</p>
-
-<p>옛안정 배포(stretch)에서, 이 문제를 버전
- 2.2.0-2+deb9u3에서 수정했습니다.</p>
-
-<p>안정 배포 (buster)에서 이 문제를 버전
-2.2.6-2+deb10u1에서 수정했습니다.</p>
-
-<p>expat 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>expat의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/expat">https://security-tracker.debian.org/tracker/expat</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4530.data"
diff --git a/korean/security/2019/dsa-4532.wml b/korean/security/2019/dsa-4532.wml
deleted file mode 100644
index a87fa8f15ed..00000000000
--- a/korean/security/2019/dsa-4532.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="edfe657325314e29fd9d674bf68e6a1399e352fe" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that SPIP, a website engine for publishing, would
-allow unauthenticated users to modify published content and write to
-the database, perform cross-site request forgeries, and enumerate
-registered users.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.1.4-4~deb9u3.</p>
-
-<p>안정 배포(buster)에서, 이 문제를
-버전 3.2.4-1+deb10u1에서 수정했습니다.</p>
-
-<p>spip 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>spip의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/spip">\
-https://security-tracker.debian.org/tracker/spip</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4532.data"
diff --git a/korean/security/2019/dsa-4533.wml b/korean/security/2019/dsa-4533.wml
deleted file mode 100644
index e82032353a4..00000000000
--- a/korean/security/2019/dsa-4533.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="764f40879fe06378ede00881560b64a7832ec4a5" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Lemonldap::NG web SSO system did not restrict
-OIDC authorization codes to the relying party.</p>
-
-<p>안정 배포(buster)에서, 이 문제를
-버전 2.0.2+ds-7+deb10u2에서 수정했습니다.</p>
-
-<p>lemonldap-ng 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>lemonldap-ng의 자세한 보안 상태는 보안 추적페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/lemonldap-ng">https://security-tracker.debian.org/tracker/lemonldap-ng</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4533.data"
diff --git a/korean/security/2019/dsa-4534.wml b/korean/security/2019/dsa-4534.wml
deleted file mode 100644
index 94fc284dfb3..00000000000
--- a/korean/security/2019/dsa-4534.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="91314767f60a71c3303788fca8a905ff30d701db" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Go programming language did accept and
-normalize invalid HTTP/1.1 headers with a space before the colon, which
-could lead to filter bypasses or request smuggling in some setups.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.11.6-1+deb10u2.</p>
-
-<p>golang-1.11 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>golang-1.11의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/golang-1.11">\
-https://security-tracker.debian.org/tracker/golang-1.11</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4534.data"
diff --git a/korean/security/2019/dsa-4537.wml b/korean/security/2019/dsa-4537.wml
deleted file mode 100644
index ce32d07c3ac..00000000000
--- a/korean/security/2019/dsa-4537.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="2591f3b4f3918e1e537cb6be077b0cae65335198" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that file-roller, an archive manager for GNOME, does
-not properly handle the extraction of archives with a single ./../ in a
-file path. An attacker able to provide a specially crafted archive for
-processing can take advantage of this flaw to overwrite files if a user
-is dragging a specific file or map to a location to extract to.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 3.22.3-1+deb9u1.</p>
-
-<p>file-roller 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>file-roller의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/file-roller">https://security-tracker.debian.org/tracker/file-roller</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4537.data"
diff --git a/korean/security/2019/dsa-4538.wml b/korean/security/2019/dsa-4538.wml
deleted file mode 100644
index b13eed5060a..00000000000
--- a/korean/security/2019/dsa-4538.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-#use wml::debian::translation-check translation="e41f5efa353b2bdd34609a011c02c9132873e041" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in the WPA protocol implementation found in
-wpa_supplication (station) and hostapd (access point).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13377">CVE-2019-13377</a>
-
- <p>A timing-based side-channel attack against WPA3's Dragonfly handshake when
- using Brainpool curves could be used by an attacker to retrieve the
- password.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16275">CVE-2019-16275</a>
-
- <p>Insufficient source address validation for some received Management frames
- in hostapd could lead to a denial of service for stations associated to an
- access point. An attacker in radio range of the access point could inject a
- specially constructed unauthenticated IEEE 802.11 frame to the access point
- to cause associated stations to be disconnected and require a reconnection
- to the network.</p></li>
-
-</ul>
-
-<p>안정 배포(buster)에서, 이 문제를
-버전 2:2.7+git20190128+0c1e29f-6+deb10u1에서 수정했습니다.</p>
-
-<p>wpa 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of wpa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wpa">\
-https://security-tracker.debian.org/tracker/wpa</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4538.data"
diff --git a/korean/security/2019/dsa-4539.wml b/korean/security/2019/dsa-4539.wml
deleted file mode 100644
index 2b1526701f7..00000000000
--- a/korean/security/2019/dsa-4539.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="62a641e1944c721e80cb7778920f8b8acd1602ef" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Three security issues were discovered in OpenSSL: A timing attack against
-ECDSA, a padding oracle in PKCS7_dataDecode() and CMS_decrypt_set1_pkey()
-and it was discovered that a feature of the random number generator (RNG)
-intended to protect against shared RNG state between parent and child
-processes in the event of a fork() syscall was not used by default.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1.1.0l-1~deb9u1.</p>
-
-<p>안정 배포(buster)에서, 이 문제를
-버전 1.1.1d-0+deb10u1에서 수정했습니다.</p>
-
-<p>openssl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>openssl의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/openssl">\
-https://security-tracker.debian.org/tracker/openssl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4539.data"
diff --git a/korean/security/2019/dsa-4540.wml b/korean/security/2019/dsa-4540.wml
deleted file mode 100644
index 42508d6b7c9..00000000000
--- a/korean/security/2019/dsa-4540.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="0c9fe5faf2768484ff398d997b94857df90b5eae" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were discovered in OpenSSL: A timing attack against
-ECDSA and a padding oracle in PKCS7_dataDecode() and
-CMS_decrypt_set1_pkey().</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1.0.2t-1~deb9u1.</p>
-
-<p>openssl1.0 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>openssl1.0의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">\
-https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4540.data"
diff --git a/korean/security/2019/dsa-4541.wml b/korean/security/2019/dsa-4541.wml
deleted file mode 100644
index d1eaebc2e71..00000000000
--- a/korean/security/2019/dsa-4541.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="e9bfb0887abebb9e360bcb75b0329ab14d8d01e8" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Max Kellermann reported a NULL pointer dereference flaw in libapreq2, a
-generic Apache request library, allowing a remote attacker to cause a
-denial of service against an application using the library (application
-crash) if an invalid nested <q>multipart</q> body is processed.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 2.13-7~deb9u1.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 2.13-7~deb10u1에서 수정했습니다.</p>
-
-<p>libapreq2 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libapreq2의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libapreq2">https://security-tracker.debian.org/tracker/libapreq2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4541.data"
diff --git a/korean/security/2019/dsa-4542.wml b/korean/security/2019/dsa-4542.wml
deleted file mode 100644
index 0a63e850245..00000000000
--- a/korean/security/2019/dsa-4542.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="6f7800b4562d66c25875afecfd9f8039b52eaf60" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that jackson-databind, a Java library used to parse
-JSON and other data formats, did not properly validate user input
-before attempting deserialization. This allowed an attacker providing
-maliciously crafted input to perform code execution, or read arbitrary
-files on the server.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 2.8.6-1+deb9u6.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 2.9.8-3+deb10u1에서 수정했습니다.</p>
-
-<p>jackson-databind 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>jackson-databind의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/jackson-databind">\
-https://security-tracker.debian.org/tracker/jackson-databind</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4542.data"
diff --git a/korean/security/2019/dsa-4543.wml b/korean/security/2019/dsa-4543.wml
deleted file mode 100644
index 08f398bb890..00000000000
--- a/korean/security/2019/dsa-4543.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-#use wml::debian::translation-check translation="1d182b3abd199000857dae0786cf70a840908dd1" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Joe Vennix discovered that sudo, a program designed to provide limited
-super user privileges to specific users, when configured to allow a user
-to run commands as an arbitrary user via the ALL keyword in a Runas
-specification, allows to run commands as root by specifying the user ID
--1 or 4294967295. This could allow a user with sufficient sudo
-privileges to run commands as root even if the Runas specification
-explicitly disallows root access.</p>
-
-<p>Details can be found in the upstream advisory at
-<a href="https://www.sudo.ws/alerts/minus_1_uid.html">https://www.sudo.ws/alerts/minus_1_uid.html</a> .</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.8.19p1-2.1+deb9u1.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 1.8.27-1+deb10u1에서 수정했습니다.</p>
-
-<p>sudo 패키지를 업그레이는 하는 게 좋습니다.</p>
-
-<p>sudo의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/sudo">https://security-tracker.debian.org/tracker/sudo</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4543.data"
diff --git a/korean/security/2019/dsa-4544.wml b/korean/security/2019/dsa-4544.wml
deleted file mode 100644
index cc82f43c36b..00000000000
--- a/korean/security/2019/dsa-4544.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="824bb3a694e85897a4c09b1b62e6d8ceab45f71f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>X41 D-Sec discovered that unbound, a validating, recursive, and
-caching DNS resolver, did not correctly process some NOTIFY
-queries. This could lead to remote denial-of-service by application
-crash.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 1.9.0-2+deb10u1에서 수정했습니다.</p>
-
-<p>unbound 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>unbound의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/unbound">\
-https://security-tracker.debian.org/tracker/unbound</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4544.data"
diff --git a/korean/security/2019/dsa-4545.wml b/korean/security/2019/dsa-4545.wml
deleted file mode 100644
index b3c7cabe1b2..00000000000
--- a/korean/security/2019/dsa-4545.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="4c9d1b69ec0ccf3d0de5b359855773a61d894458" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Special:Redirect functionality of MediaWiki,
-a website engine for collaborative work, could expose suppressed user
-names, resulting in an information leak.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1:1.27.7-1~deb9u2.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1:1.31.4-1~deb10u1.</p>
-
-<p>mediawiki 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>mediawiki 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">\
-https://security-tracker.debian.org/tracker/mediawiki</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4545.data"
diff --git a/korean/security/2019/dsa-4546.wml b/korean/security/2019/dsa-4546.wml
deleted file mode 100644
index adab4aac3a8..00000000000
--- a/korean/security/2019/dsa-4546.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="9ba16bbc6be99033df4e4ffe42ce76010f0c0ada" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java
-runtime, resulting in cross-site scripting, denial of service,
-information disclosure or Kerberos user impersonation.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 11_11.0.5+10-1~deb10u1.</p>
-
-<p>openjdk-11 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>openjdk-11의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/openjdk-11">\
-https://security-tracker.debian.org/tracker/openjdk-11</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4546.data"
diff --git a/korean/security/2019/dsa-4549.wml b/korean/security/2019/dsa-4549.wml
deleted file mode 100644
index 4eac5b3ba13..00000000000
--- a/korean/security/2019/dsa-4549.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-#use wml::debian::translation-check translation="a7762d7ea18afc6d77cb26d372f94053b56575af" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure, cross-site scripting or denial of service.</p>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 60.x series has ended, so starting with this update we're now
-following the 68.x releases.</p>
-
-<p>For the oldstable distribution (stretch), some additional config changes
-to the buildd network are needed (to provide the new Rust-based toolchain
-needed by ESR68). Packages will be made available when those are sorted out.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 68.2.0esr-1~deb10u1.</p>
-
-<p>firefox-esr 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4549.data"
diff --git a/korean/security/2019/dsa-4550.wml b/korean/security/2019/dsa-4550.wml
deleted file mode 100644
index 21f3a459d1d..00000000000
--- a/korean/security/2019/dsa-4550.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="826cb7fbcde2e2ebb7cd752ad98562cf7e04ed2b" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow was found in file, a file type classification tool,
-which may result in denial of service or potentially the execution of
-arbitrary code if a malformed CDF (Composite Document File) file is
-processed.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1:5.30-1+deb9u3.</p>
-
-<p>안정배포(buster)에서, 이 문제를
-버전 1:5.35-4+deb10u1에서 수정했습니다.</p>
-
-<p>file 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>file의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/file">\
-https://security-tracker.debian.org/tracker/file</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4550.data"
diff --git a/korean/security/2019/dsa-4551.wml b/korean/security/2019/dsa-4551.wml
deleted file mode 100644
index 413f20d6031..00000000000
--- a/korean/security/2019/dsa-4551.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="b1373fcfc6758f2f138df624671023f567d5391e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Daniel Mandragona discovered that invalid DSA public keys can cause a
-panic in dsa.Verify(), resulting in denial of service.</p>
-
-<p>안정배포(buster)에서, 이 문제를
-버전 1.11.6-1+deb10u3에서 수정했습니다.</p>
-
-<p>golang-1.11 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>golang-1.11의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/golang-1.11">\
-https://security-tracker.debian.org/tracker/golang-1.11</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4551.data"
diff --git a/korean/security/2019/dsa-4552.wml b/korean/security/2019/dsa-4552.wml
deleted file mode 100644
index 6a78132a7f4..00000000000
--- a/korean/security/2019/dsa-4552.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="ed685b196cba4d44fb30b79fdb9a66d81f4abcd5" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Emil Lerner and Andrew Danau discovered that insufficient validation
-in the path handling code of PHP FPM could result in the execution of
-arbitrary code in some setups.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 7.0.33-0+deb9u6.</p>
-
-<p>php7.0 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php7.0의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php7.0">\
-https://security-tracker.debian.org/tracker/php7.0</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4552.data"
diff --git a/korean/security/2019/dsa-4553.wml b/korean/security/2019/dsa-4553.wml
deleted file mode 100644
index 1ecacc5e8dd..00000000000
--- a/korean/security/2019/dsa-4553.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="9ee46b7d3e02ac3f7de53a693d2fdd398e9371c3" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Emil Lerner and Andrew Danau discovered that insufficient validation
-in the path handling code of PHP FPM could result in the execution of
-arbitrary code in some setups.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 7.3.11-1~deb10u1.</p>
-
-<p>php7.3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php7.3의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php7.3">\
-https://security-tracker.debian.org/tracker/php7.3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4553.data"
diff --git a/korean/security/2019/dsa-4554.wml b/korean/security/2019/dsa-4554.wml
deleted file mode 100644
index 2d1d9187fea..00000000000
--- a/korean/security/2019/dsa-4554.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="17e6ef0aedb57c73f48ac93cbcf2391e133c41c8" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that ruby-loofah, a general library for manipulating
-and transforming HTML/XML documents and fragments, was susceptible to
-cross-site scripting.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 2.0.3-2+deb9u3.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 2.2.3-1+deb10u1.</p>
-
-<p>ruby-loofah 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ruby-loofah의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ruby-loofah">\
-https://security-tracker.debian.org/tracker/ruby-loofah</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4554.data"
diff --git a/korean/security/2019/dsa-4555.wml b/korean/security/2019/dsa-4555.wml
deleted file mode 100644
index fb7357f82e0..00000000000
--- a/korean/security/2019/dsa-4555.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="72b5a29db220141c13b2e15f6d1be16ae48d1fdf" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Malte Kraus discovered that libpam-python, a PAM module allowing PAM
-modules to be written in Python, didn't sanitise environment variables
-which could result in local privilege escalation if used with a
-setuid binary.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.0.6-1.1+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.0.6-1.1+deb10u1.</p>
-
-<p>pam-python 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>pam-python의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/pam-python">\
-https://security-tracker.debian.org/tracker/pam-python</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4555.data"
diff --git a/korean/security/2019/dsa-4556.wml b/korean/security/2019/dsa-4556.wml
deleted file mode 100644
index f9be5ea870a..00000000000
--- a/korean/security/2019/dsa-4556.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="12a69593b8a0e4a988d844f2ea36f23eb7c4a7d8" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds memory access was discovered in the Qt library, which
-could result in denial of service through a text file containing many
-directional characters.</p>
-
-<p>The oldstable distribution (stretch) is not affected.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 5.11.3+dfsg1-1+deb10u1에서 수정했습니다.</p>
-
-<p>qtbase-opensource-src 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>qtbase-opensource-src의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/qtbase-opensource-src">\
-https://security-tracker.debian.org/tracker/qtbase-opensource-src</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4556.data"
diff --git a/korean/security/2019/dsa-4557.wml b/korean/security/2019/dsa-4557.wml
deleted file mode 100644
index 0617133f57f..00000000000
--- a/korean/security/2019/dsa-4557.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="5f4f92ff45c586b386b386dc79214e5978d768e7" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free was found in libarchive, a multi-format archive and
-compression library, which could result in denial of service and
-potentially the execution of arbitrary code is a malformed archive
-is processed.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 3.2.2-2+deb9u2.</p>
-
-<p>안정배포(buster)에서, 이 문제를
-버전 3.3.3-4+deb10u1에서 수정했습니다.</p>
-
-<p>libarchive 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libarchive의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libarchive">\
-https://security-tracker.debian.org/tracker/libarchive</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4557.data"
diff --git a/korean/security/2019/dsa-4558.wml b/korean/security/2019/dsa-4558.wml
deleted file mode 100644
index 8a2797fa7ed..00000000000
--- a/korean/security/2019/dsa-4558.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-#use wml::debian::translation-check translation="122cd4d0371114e8cb5f8eb2f4d7b3d228204e1e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 webkit2gtk 웹 엔진에서 발견:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8625">CVE-2019-8625</a>
-
- <p>Sergei Glazunov discovered that maliciously crafted web content
- may lead to universal cross site scripting.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8720">CVE-2019-8720</a>
-
- <p>Wen Xu discovered that maliciously crafted web content may lead to
- arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8769">CVE-2019-8769</a>
-
- <p>Pierre Reimertz discovered that visiting a maliciously crafted
- website may reveal browsing history.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8771">CVE-2019-8771</a>
-
- <p>Eliya Stein discovered that maliciously crafted web content may
- violate iframe sandboxing policy.</p></li>
-
-</ul>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 2.26.1-3~deb10u1에서 수정했습니다.</p>
-
-<p>webkit2gtk 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>webkit2gtk의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">\
-https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4558.data"
diff --git a/korean/security/2019/dsa-4559.wml b/korean/security/2019/dsa-4559.wml
deleted file mode 100644
index 391bd2fb600..00000000000
--- a/korean/security/2019/dsa-4559.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="12b7e90602cd5c473864d880b87e4a67b94c67d1" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Stephan Zeisberg discovered that missing input validation in ProFTPD, a
-FTP/SFTP/FTPS server, could result in denial of service via an infinite
-loop.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.3.5b-4+deb9u2.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 1.3.6-4+deb10u2에서 수정했습니다.</p>
-
-<p>proftpd-dfsg 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>proftpd-dfsg의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/proftpd-dfsg">\
-https://security-tracker.debian.org/tracker/proftpd-dfsg</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4559.data"
diff --git a/korean/security/2019/dsa-4560.wml b/korean/security/2019/dsa-4560.wml
deleted file mode 100644
index 109d6656376..00000000000
--- a/korean/security/2019/dsa-4560.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="38a4027b3a627340890c62d9540431aedc0a25e5" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that in SimpleSAMLphp, an implementation of the
-SAML 2.0 protocol, it was possible to circumvent XML signature
-verification on SAML messages.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.14.11-1+deb9u2.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.16.3-1+deb10u1.</p>
-
-<p>simplesamlphp 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>simplesamlphp의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/simplesamlphp">https://security-tracker.debian.org/tracker/simplesamlphp</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4560.data"
diff --git a/korean/security/2019/dsa-4561.wml b/korean/security/2019/dsa-4561.wml
deleted file mode 100644
index 4bd6d4c66fd..00000000000
--- a/korean/security/2019/dsa-4561.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="6286cf953c8e8e38255f3121c0edf3daa3904692" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Alex Murray discovered a stack-based buffer overflow vulnerability in
-fribidi, an implementation of the Unicode Bidirectional Algorithm
-algorithm, which could result in denial of service or potentially the
-execution of arbitrary code, when processing a large number of unicode
-isolate directional characters.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.0.5-3.1+deb10u1.</p>
-
-<p>fribidi 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>fribidi의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/fribidi">https://security-tracker.debian.org/tracker/fribidi</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4561.data"
diff --git a/korean/security/2019/dsa-4562.wml b/korean/security/2019/dsa-4562.wml
deleted file mode 100644
index b39efcfb9a8..00000000000
--- a/korean/security/2019/dsa-4562.wml
+++ /dev/null
@@ -1,305 +0,0 @@
-#use wml::debian::translation-check translation="760d05261a5f3ebd0572961cf16b78a849bea91a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>chromium 웹 브라우저에서 여러 취약점을 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5869">CVE-2019-5869</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5870">CVE-2019-5870</a>
-
- <p>Guang Gong discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5871">CVE-2019-5871</a>
-
- <p>A buffer overflow issue was discovered in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5872">CVE-2019-5872</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5874">CVE-2019-5874</a>
-
- <p>James Lee discovered an issue with external Uniform Resource Identifiers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5875">CVE-2019-5875</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5876">CVE-2019-5876</a>
-
- <p>Man Yue Mo discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5877">CVE-2019-5877</a>
-
- <p>Guang Gong discovered an out-of-bounds read issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5878">CVE-2019-5878</a>
-
- <p>Guang Gong discovered an use-after-free issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5879">CVE-2019-5879</a>
-
- <p>Jinseo Kim discover that extensions could read files on the local
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5880">CVE-2019-5880</a>
-
- <p>Jun Kokatsu discovered a way to bypass the SameSite cookie feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13659">CVE-2019-13659</a>
-
- <p>Lnyas Zhang discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13660">CVE-2019-13660</a>
-
- <p>Wenxu Wu discovered a user interface error in full screen mode.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13661">CVE-2019-13661</a>
-
- <p>Wenxu Wu discovered a user interface spoofing issue in full screen mode.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13662">CVE-2019-13662</a>
-
- <p>David Erceg discovered a way to bypass the Content Security Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13663">CVE-2019-13663</a>
-
- <p>Lnyas Zhang discovered a way to spoof Internationalized Domain Names.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13664">CVE-2019-13664</a>
-
- <p>Thomas Shadwell discovered a way to bypass the SameSite cookie feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13665">CVE-2019-13665</a>
-
- <p>Jun Kokatsu discovered a way to bypass the multiple file download
- protection feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13666">CVE-2019-13666</a>
-
- <p>Tom Van Goethem discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13667">CVE-2019-13667</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13668">CVE-2019-13668</a>
-
- <p>David Erceg discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13669">CVE-2019-13669</a>
-
- <p>Khalil Zhani discovered an authentication spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13670">CVE-2019-13670</a>
-
- <p>Guang Gong discovered a memory corruption issue in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13671">CVE-2019-13671</a>
-
- <p>xisigr discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13673">CVE-2019-13673</a>
-
- <p>David Erceg discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13674">CVE-2019-13674</a>
-
- <p>Khalil Zhani discovered a way to spoof Internationalized Domain Names.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13675">CVE-2019-13675</a>
-
- <p>Jun Kokatsu discovered a way to disable extensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13676">CVE-2019-13676</a>
-
- <p>Wenxu Wu discovered an error in a certificate warning.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13677">CVE-2019-13677</a>
-
- <p>Jun Kokatsu discovered an error in the chrome web store.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13678">CVE-2019-13678</a>
-
- <p>Ronni Skansing discovered a spoofing issue in the download dialog window.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13679">CVE-2019-13679</a>
-
- <p>Conrad Irwin discovered that user activation was not required for
- printing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13680">CVE-2019-13680</a>
-
- <p>Thijs Alkamade discovered an IP address spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13681">CVE-2019-13681</a>
-
- <p>David Erceg discovered a way to bypass download restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13682">CVE-2019-13682</a>
-
- <p>Jun Kokatsu discovered a way to bypass the site isolation feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13683">CVE-2019-13683</a>
-
- <p>David Erceg discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13685">CVE-2019-13685</a>
-
- <p>Khalil Zhani discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13686">CVE-2019-13686</a>
-
- <p>Brendon discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13687">CVE-2019-13687</a>
-
- <p>Man Yue Mo discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13688">CVE-2019-13688</a>
-
- <p>Man Yue Mo discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13691">CVE-2019-13691</a>
-
- <p>David Erceg discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13692">CVE-2019-13692</a>
-
- <p>Jun Kokatsu discovered a way to bypass the Same Origin Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13693">CVE-2019-13693</a>
-
- <p>Guang Gong discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13694">CVE-2019-13694</a>
-
- <p>banananapenguin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13695">CVE-2019-13695</a>
-
- <p>Man Yue Mo discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13696">CVE-2019-13696</a>
-
- <p>Guang Gong discovered a use-after-free issue in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13697">CVE-2019-13697</a>
-
- <p>Luan Herrera discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13699">CVE-2019-13699</a>
-
- <p>Man Yue Mo discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13700">CVE-2019-13700</a>
-
- <p>Man Yue Mo discovered a buffer overflow issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13701">CVE-2019-13701</a>
-
- <p>David Erceg discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13702">CVE-2019-13702</a>
-
- <p>Phillip Langlois and Edward Torkington discovered a privilege escalation
- issue in the installer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13703">CVE-2019-13703</a>
-
- <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13704">CVE-2019-13704</a>
-
- <p>Jun Kokatsu discovered a way to bypass the Content Security Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13705">CVE-2019-13705</a>
-
- <p>Luan Herrera discovered a way to bypass extension permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13706">CVE-2019-13706</a>
-
- <p>pdknsk discovered an out-of-bounds read issue in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13707">CVE-2019-13707</a>
-
- <p>Andrea Palazzo discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13708">CVE-2019-13708</a>
-
- <p>Khalil Zhani discovered an authentication spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13709">CVE-2019-13709</a>
-
- <p>Zhong Zhaochen discovered a way to bypass download restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13710">CVE-2019-13710</a>
-
- <p>bernardo.mrod discovered a way to bypass download restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13711">CVE-2019-13711</a>
-
- <p>David Erceg discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13713">CVE-2019-13713</a>
-
- <p>David Erceg discovered an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13714">CVE-2019-13714</a>
-
- <p>Jun Kokatsu discovered an issue with Cascading Style Sheets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13715">CVE-2019-13715</a>
-
- <p>xisigr discovered a URL spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13716">CVE-2019-13716</a>
-
- <p>Barron Hagerman discovered an error in the service worker implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13717">CVE-2019-13717</a>
-
- <p>xisigr discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13718">CVE-2019-13718</a>
-
- <p>Khalil Zhani discovered a way to spoof Internationalized Domain Names.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13719">CVE-2019-13719</a>
-
- <p>Khalil Zhani discovered a user interface spoofing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13720">CVE-2019-13720</a>
-
- <p>Anton Ivanov and Alexey Kulaev discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13721">CVE-2019-13721</a>
-
- <p>banananapenguin discovered a use-after-free issue in the pdfium library.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), support for chromium has been
-discontinued. Please upgrade to the stable release (buster) to continue
-receiving chromium updates or switch to firefox, which continues to be
-supported in the oldstable release.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 78.0.3904.97-1~deb10u1.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4562.data"
diff --git a/korean/security/2019/dsa-4565.wml b/korean/security/2019/dsa-4565.wml
deleted file mode 100644
index 3918fbeabed..00000000000
--- a/korean/security/2019/dsa-4565.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-#use wml::debian::translation-check translation="45bbfa11bc27bcea1ec2a28b213e086f5b18be60" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>This update ships updated CPU microcode for some types of Intel CPUs. In
-particular it provides mitigations for the TAA (TSX Asynchronous Abort)
-vulnerability. For affected CPUs, to fully mitigate the vulnerability it
-is also necessary to update the Linux kernel packages as released in DSA
-4564-1.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.20191112.1~deb9u1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 3.20191112.1~deb10u1.</p>
-
-<p>intel-microcode 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of intel-microcode please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">\
-https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4565.data"
diff --git a/korean/security/2019/dsa-4566.wml b/korean/security/2019/dsa-4566.wml
deleted file mode 100644
index 69dd31976a5..00000000000
--- a/korean/security/2019/dsa-4566.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="771af82940577334ab5d15e6b8037ed647902c1a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>This update for QEMU, a fast processor emulator, backports support to
-passthrough the pschange-mc-no CPU flag. The virtualised MSR seen by a
-guest is set to show the bug as fixed, allowing to disable iTLB Multihit
-mitigations in nested hypervisors (cf. DSA 4564-1).</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1:3.1+dfsg-8+deb10u3.</p>
-
-<p>qemu 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of qemu please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">\
-https://security-tracker.debian.org/tracker/qemu</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4566.data"
diff --git a/korean/security/2019/dsa-4567.wml b/korean/security/2019/dsa-4567.wml
deleted file mode 100644
index 4fa38c40dfe..00000000000
--- a/korean/security/2019/dsa-4567.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="648ff72f6ffd3349cfdce3e4231f45386fc97aa0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the vhost PMD in DPDK, a set of libraries for
-fast packet processing, was affected by memory and file descriptor leaks
-which could result in denial of service.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 16.11.9-1+deb9u2.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 18.11.2-2+deb10u2.</p>
-
-<p>dpdk 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of dpdk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dpdk">\
-https://security-tracker.debian.org/tracker/dpdk</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4567.data"
diff --git a/korean/security/2019/dsa-4568.wml b/korean/security/2019/dsa-4568.wml
deleted file mode 100644
index 866ffafc5a6..00000000000
--- a/korean/security/2019/dsa-4568.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="82b298d8baf108aa4e5fd50bb44362370b794adc" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Rich Mirch discovered that the pg_ctlcluster script didn't drop
-privileges when creating socket/statistics temporary directories, which
-could result in local privilege escalation.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 181+deb9u3.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 200+deb10u3.</p>
-
-<p>postgresql-common 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of postgresql-common please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-common">\
-https://security-tracker.debian.org/tracker/postgresql-common</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4568.data"
diff --git a/korean/security/2019/dsa-4569.wml b/korean/security/2019/dsa-4569.wml
deleted file mode 100644
index e9bf2b45259..00000000000
--- a/korean/security/2019/dsa-4569.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="b8b00bff47207c34c4758856b55dada46b60eea2" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Manfred Paul and Lukas Schauer reported that the .charkeys procedure in
-Ghostscript, the GPL PostScript/PDF interpreter, does not properly
-restrict privileged calls, which could result in bypass of file system
-restrictions of the dSAFER sandbox.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 9.26a~dfsg-0+deb9u6.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 9.27~dfsg-2+deb10u3.</p>
-
-<p>ghostscript 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of ghostscript please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4569.data"
diff --git a/korean/security/2019/dsa-4570.wml b/korean/security/2019/dsa-4570.wml
deleted file mode 100644
index 6d40d5718d4..00000000000
--- a/korean/security/2019/dsa-4570.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="94483780a4ee5447d63c7ccf6a51a1500ca3edf0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in mosquitto, a MQTT version 3.1/3.1.1
-compatible message broker, allowing a malicious MQTT client to cause a
-denial of service (stack overflow and daemon crash), by sending a
-specially crafted SUBSCRIBE packet containing a topic with a extremely
-deep hierarchy.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.5.7-1+deb10u1.</p>
-
-<p>mosquitto 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of mosquitto please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mosquitto">https://security-tracker.debian.org/tracker/mosquitto</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4570.data"
diff --git a/korean/security/2019/dsa-4571.wml b/korean/security/2019/dsa-4571.wml
deleted file mode 100644
index a5b3bd41d03..00000000000
--- a/korean/security/2019/dsa-4571.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-#use wml::debian::translation-check translation="60422bd0c097175d65df54198ba0c43ce4827c17" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code or denial of
-service.</p>
-
-<p>Debian follows the Thunderbird upstream releases. Support for the 60.x
-series has ended, so starting with this update we're now following the
-68.x releases.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1:68.2.2-1~deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1:68.2.2-1~deb10u1.</p>
-
-<p>thunderbird 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">\
-https://security-tracker.debian.org/tracker/thunderbird</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4571.data"
diff --git a/korean/security/2019/dsa-4572.wml b/korean/security/2019/dsa-4572.wml
deleted file mode 100644
index 16ff0d753ea..00000000000
--- a/korean/security/2019/dsa-4572.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="137e4da6051203d226eeef60c621df2dce3a99c0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Simple Linux Utility for Resource Management
-(SLURM), a cluster resource management and job scheduling system, did
-not escape strings when importing an archive file into the
-accounting_storage/mysql backend, resulting in SQL injection.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 18.08.5.2-1+deb10u1.</p>
-
-<p>slurm-llnl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of slurm-llnl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/slurm-llnl">\
-https://security-tracker.debian.org/tracker/slurm-llnl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4572.data"
diff --git a/korean/security/2019/dsa-4573.wml b/korean/security/2019/dsa-4573.wml
deleted file mode 100644
index acb1267f9c1..00000000000
--- a/korean/security/2019/dsa-4573.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="21677aab7abaa5aba8cdae17e68bc66f39e97357" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in the Symfony PHP framework
-which could lead to a timing attack/information leak, argument injection
-and code execution via unserialization.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 2.8.7+dfsg-1.3+deb9u3.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 3.4.22+dfsg-2+deb10u1.</p>
-
-<p>symfony 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of symfony please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/symfony">\
-https://security-tracker.debian.org/tracker/symfony</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4573.data"
diff --git a/korean/security/2019/dsa-4574.wml b/korean/security/2019/dsa-4574.wml
deleted file mode 100644
index 41aeb4a7c34..00000000000
--- a/korean/security/2019/dsa-4574.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="a9d7dc155ea549b91437b73d3bb84bd32f16da90" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Holger Just discovered an SQL injection in Redmine, a project management
-web application. In addition a cross-site scripting issue was found in
-Textile formatting.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.3.1-4+deb9u3.</p>
-
-<p>redmine 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>redmine의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/redmine">\
-https://security-tracker.debian.org/tracker/redmine</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4574.data"
diff --git a/korean/security/2019/dsa-4575.wml b/korean/security/2019/dsa-4575.wml
deleted file mode 100644
index ff43921df65..00000000000
--- a/korean/security/2019/dsa-4575.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-#use wml::debian::translation-check translation="1975c9db16f264b28b074f2173a6bcda403cd1f1" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 chromium 웹 브라우저에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13723">CVE-2019-13723</a>
-
- <p>Yuxiang Li discovered a use-after-free issue in the bluetooth service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13724">CVE-2019-13724</a>
-
- <p>Yuxiang Li discovered an out-of-bounds read issue in the bluetooth
- service.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), security support for the chromium
-package has been discontinued.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 78.0.3904.108-1~deb10u1.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4575.data"
diff --git a/korean/security/2019/dsa-4576.wml b/korean/security/2019/dsa-4576.wml
deleted file mode 100644
index c99229f242f..00000000000
--- a/korean/security/2019/dsa-4576.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="a3e9011061fe14746edd52c7a1e14d8c89ba439b" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds write vulnerability was discovered in php-imagick, a
-PHP extension to create and modify images using the ImageMagick API,
-which could result in denial of service, or potentially the execution of
-arbitrary code.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 3.4.3~rc2-2+deb9u1.</p>
-
-<p>php-imagick 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of php-imagick please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-imagick">https://security-tracker.debian.org/tracker/php-imagick</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4576.data"
diff --git a/korean/security/2019/dsa-4578.wml b/korean/security/2019/dsa-4578.wml
deleted file mode 100644
index a7f0bfa158a..00000000000
--- a/korean/security/2019/dsa-4578.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="d9f28d597b792649fe587d865a643263d9c0a3bd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in libvpx multimedia library which
-could result in denial of service and potentially the execution of
-arbitrary code if malformed WebM files are processed.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1.6.1-3+deb9u2.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1.7.0-3+deb10u1.</p>
-
-<p>libvpx 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libvpx의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libvpx">\
-https://security-tracker.debian.org/tracker/libvpx</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4578.data"
diff --git a/korean/security/2019/dsa-4581.wml b/korean/security/2019/dsa-4581.wml
deleted file mode 100644
index d5291564c42..00000000000
--- a/korean/security/2019/dsa-4581.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-#use wml::debian::translation-check translation="70be9894f7f65be4520c817dfd389d2ee7c87f04" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 빠르고, 스케일러블한 분산 리비전 제어 시스템 git에서 발견했습니다.
-</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1348">CVE-2019-1348</a>
-
- <p>It was reported that the --export-marks option of git fast-import is
- exposed also via the in-stream command feature export-marks=...,
- allowing to overwrite arbitrary paths.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1387">CVE-2019-1387</a>
-
- <p>It was discovered that submodule names are not validated strictly
- enough, allowing very targeted attacks via remote code execution
- when performing recursive clones.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19604">CVE-2019-19604</a>
-
- <p>Joern Schneeweisz reported a vulnerability, where a recursive clone
- followed by a submodule update could execute code contained within
- the repository without the user explicitly having asked for that. It
- is now disallowed for `.gitmodules` to have entries that set
- `submodule.&lt;name&gt;.update=!command`.</p></li>
-
-</ul>
-
-<p>In addition this update addresses a number of security issues which are
-only an issue if git is operating on an NTFS filesystem (<a href="https://security-tracker.debian.org/tracker/CVE-2019-1349">CVE-2019-1349</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-1352">CVE-2019-1352</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2019-1353">CVE-2019-1353</a>).</p>
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1:2.11.0-3+deb9u5.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1:2.20.1-2+deb10u1.</p>
-
-<p>git 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>git의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4581.data"
diff --git a/korean/security/2019/dsa-4583.wml b/korean/security/2019/dsa-4583.wml
deleted file mode 100644
index 42477baf92f..00000000000
--- a/korean/security/2019/dsa-4583.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="add2c354d4048bff1caa9e7e9ab5fd4711d2cf3d" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in the SPIP publishing system, which
-could result in unauthorised writes to the database by authors.</p>
-
-<p>The oldstable distribution (stretch) is not affected.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 3.2.4-1+deb10u2.</p>
-
-<p>spip 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>spip의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/spip">\
-https://security-tracker.debian.org/tracker/spip</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4583.data"
diff --git a/korean/security/2019/dsa-4584.wml b/korean/security/2019/dsa-4584.wml
deleted file mode 100644
index 9e6507882cc..00000000000
--- a/korean/security/2019/dsa-4584.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-#use wml::debian::translation-check translation="be70261454371a10eda4db4df697e3ff80e95b74" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in spamassassin, a Perl-based spam
-filter using text analysis.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11805">CVE-2018-11805</a>
-
- <p>Malicious rule or configuration files, possibly downloaded from an
- updates server, could execute arbitrary commands under multiple
- scenarios.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12420">CVE-2019-12420</a>
-
- <p>Specially crafted mulitpart messages can cause spamassassin to use
- excessive resources, resulting in a denial of service.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.4.2-1~deb9u2.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 3.4.2-1+deb10u1.</p>
-
-<p>spamassassin 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>spamassassin 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/spamassassin">\
-https://security-tracker.debian.org/tracker/spamassassin</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4584.data"
diff --git a/korean/security/2019/dsa-4585.wml b/korean/security/2019/dsa-4585.wml
deleted file mode 100644
index eeb1cde56d5..00000000000
--- a/korean/security/2019/dsa-4585.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="96cc70c332b480ca413d25d5ea30e55f6f1eaae5" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1:68.3.0-2~deb9u1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1:68.3.0-2~deb10u1.</p>
-
-<p>thunderbird 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>thunderbird의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">\
-https://security-tracker.debian.org/tracker/thunderbird</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4585.data"
diff --git a/korean/security/2019/dsa-4588.wml b/korean/security/2019/dsa-4588.wml
deleted file mode 100644
index 55efb03bfea..00000000000
--- a/korean/security/2019/dsa-4588.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="fd5cf2fc0633cd70b5c718df841025bd8ad4c7d6" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that python-ecdsa, a cryptographic signature library
-for Python, incorrectly handled certain signatures. A remote attacker
-could use this issue to cause python-ecdsa to either not warn about
-incorrect signatures, or generate exceptions resulting in a
-denial-of-service.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 0.13-2+deb9u1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 0.13-3+deb10u1.</p>
-
-<p>python-ecdsa 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-ecdsa 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-ecdsa">\
-https://security-tracker.debian.org/tracker/python-ecdsa</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4588.data"
diff --git a/korean/security/2019/dsa-4589.wml b/korean/security/2019/dsa-4589.wml
deleted file mode 100644
index 4c50ef6cf47..00000000000
--- a/korean/security/2019/dsa-4589.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="75f72653f09f3b9a1c1b3b6d4d31909e56f4509f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that debian-edu-config, a set of configuration files
-used for the Debian Edu blend, configured too permissive ACLs for the
-Kerberos admin server, which allowed password changes for other user
-principals.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.929+deb9u4.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 2.10.65+deb10u3.</p>
-
-<p>debian-edu-config 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>debian-edu-config의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/debian-edu-config">\
-https://security-tracker.debian.org/tracker/debian-edu-config</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4589.data"
diff --git a/korean/security/2019/dsa-4590.wml b/korean/security/2019/dsa-4590.wml
deleted file mode 100644
index e7e95861111..00000000000
--- a/korean/security/2019/dsa-4590.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="49ebb54e257a4235010353f0f35ea62dfeff80af" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the lmtpd component of the Cyrus IMAP server
-created mailboxes with administrator privileges if the <q>fileinto</q> was
-used, bypassing ACL checks.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 2.5.10-3+deb9u2.</p>
-
-<p>For the stable distribution 안정배포(buster)에서, 이 문제를 버전 3.0.8-6+deb10u3에서 수정했습니다.</p>
-
-<p>cyrus-imapd 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>cyrus-imapd의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/cyrus-imapd">\
-https://security-tracker.debian.org/tracker/cyrus-imapd</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4590.data"
diff --git a/korean/security/2019/dsa-4591.wml b/korean/security/2019/dsa-4591.wml
deleted file mode 100644
index 331a7fbc702..00000000000
--- a/korean/security/2019/dsa-4591.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="df11709715cec99dcc46d31e0498723d0062fe70" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Stephan Zeisberg reported an out-of-bounds write vulnerability in the
-_sasl_add_string() function in cyrus-sasl2, a library implementing the
-Simple Authentication and Security Layer. A remote attacker can take
-advantage of this issue to cause denial-of-service conditions for
-applications using the library.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 2.1.27~101-g0780600+dfsg-3+deb9u1.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 2.1.27+dfsg-1+deb10u1에서 수정했습니다.</p>
-
-<p>cyrus-sasl2 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>cyrus-sasl2의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/cyrus-sasl2">https://security-tracker.debian.org/tracker/cyrus-sasl2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4591.data"
diff --git a/korean/security/2019/dsa-4593.wml b/korean/security/2019/dsa-4593.wml
deleted file mode 100644
index 0f571cc37f8..00000000000
--- a/korean/security/2019/dsa-4593.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-#use wml::debian::translation-check translation="4b462ea192fc355c557625a4edd8b02668ca91dd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was found that freeimage, a graphics library, was affected by the
-following two security issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12211">CVE-2019-12211</a>
-
- <p>Heap buffer overflow caused by invalid memcpy in PluginTIFF. This
- flaw might be leveraged by remote attackers to trigger denial of
- service or any other unspecified impact via crafted TIFF data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12213">CVE-2019-12213</a>
-
- <p>Stack exhaustion caused by unwanted recursion in PluginTIFF. This
- flaw might be leveraged by remote attackers to trigger denial of
- service via crafted TIFF data.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.17.0+ds1-5+deb9u1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 3.18.0+ds2-1+deb10u1.</p>
-
-<p>freeimage 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>freeimage 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/freeimage">\
-https://security-tracker.debian.org/tracker/freeimage</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4593.data"
diff --git a/korean/security/2019/dsa-4594.wml b/korean/security/2019/dsa-4594.wml
deleted file mode 100644
index 2a0a6ab7f38..00000000000
--- a/korean/security/2019/dsa-4594.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="11e1663e57afd4ec01a9dcd0258d09273ea21e5e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Guido Vranken discovered an overflow bug in the x64_64 Montgomery
-squaring procedure used in exponentiation with 512-bit moduli.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.0.2u-1~deb9u1.</p>
-
-<p>openssl1.0 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>openssl1.0의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">\
-https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4594.data"
diff --git a/korean/security/2019/dsa-4595.wml b/korean/security/2019/dsa-4595.wml
deleted file mode 100644
index f130540e550..00000000000
--- a/korean/security/2019/dsa-4595.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-#use wml::debian::translation-check translation="6519242e58366ed179bc8c8fb2e8ca3bf298cfae" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that debian-lan-config, a FAI config space for the
-Debian-LAN system, configured too permissive ACLs for the Kerberos admin
-server, which allowed password changes for other user principals.</p>
-
-<p>This update provides a fixed configuration for new deployments, for
-existing setups, the NEWS file shipped in this update provides advice
-to fix the configuration.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 0.23+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 0.25+deb10u1.</p>
-
-<p>debian-lan-config 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>debian-lan-config의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/debian-lan-config">\
-https://security-tracker.debian.org/tracker/debian-lan-config</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4595.data"
diff --git a/korean/security/2019/dsa-4596.wml b/korean/security/2019/dsa-4596.wml
deleted file mode 100644
index b043cac2e3c..00000000000
--- a/korean/security/2019/dsa-4596.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="65d7367533385d5273f2b4e5575c52530adab6a9" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in the Tomcat servlet and JSP engine, which
-could result in session fixation attacks, information disclosure, cross-site
-scripting, denial of service via resource exhaustion and insecure
-redirects.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 8.5.50-0+deb9u1. This update also requires an updated version
-of tomcat-native which has been updated to 1.2.21-1~deb9u1.</p>
-
-<p>tomcat8 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>tomcat8의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/tomcat8">\
-https://security-tracker.debian.org/tracker/tomcat8</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4596.data"
diff --git a/korean/security/2020/dsa-4597.wml b/korean/security/2020/dsa-4597.wml
deleted file mode 100644
index 218fe031d2b..00000000000
--- a/korean/security/2020/dsa-4597.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="8a8180313689caf093ac3fe147b1018a2c6545dd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was reported that Netty, a Java NIO client/server framework, is prone
-to a HTTP request smuggling vulnerability due to mishandling whitespace
-before the colon in HTTP headers.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1:4.1.7-2+deb9u1.</p>
-
-<p>안정 배포(buster)에서, 이 문제를 버전 1:4.1.33-1+deb10u1에서 수정했습니다.</p>
-
-<p>netty 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>netty의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/netty">https://security-tracker.debian.org/tracker/netty</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4597.data"
diff --git a/korean/security/2020/dsa-4598.wml b/korean/security/2020/dsa-4598.wml
deleted file mode 100644
index d16f4afdbe9..00000000000
--- a/korean/security/2020/dsa-4598.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-#use wml::debian::translation-check translation="f141e134bdc80eb626430d22803e62ca0e69b576" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Simon Charette reported that the password reset functionality in Django,
-a high-level Python web development framework, uses a Unicode
-case-insensitive query to retrieve accounts matching the email address
-requesting the password reset. An attacker can take advantage of this
-flaw to potentially retrieve password reset tokens and hijack accounts.</p>
-
-<p>For details please refer to
-<a href="https://www.djangoproject.com/weblog/2019/dec/18/security-releases/">https://www.djangoproject.com/weblog/2019/dec/18/security-releases/</a></p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1:1.10.7-2+deb9u7.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1:1.11.27-1~deb10u1.</p>
-
-<p>python-django 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-django의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-django">https://security-tracker.debian.org/tracker/python-django</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4598.data"
diff --git a/korean/security/2020/dsa-4599.wml b/korean/security/2020/dsa-4599.wml
deleted file mode 100644
index 7b57e853ac3..00000000000
--- a/korean/security/2020/dsa-4599.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="e79b7fa9c4d19ab016e9734db7cf5427757e7c5e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Wordpress, a web blogging
-tool. They allowed remote attackers to perform various Cross-Side
-Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create
-open redirects, poison cache, and bypass authorization access and
-input sanitation.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 5.0.4+dfsg1-1+deb10u1에서 수정했습니다.</p>
-
-<p>wordpress 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>wordpress의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/wordpress">\
-https://security-tracker.debian.org/tracker/wordpress</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4599.data"
diff --git a/korean/security/2020/dsa-4601.wml b/korean/security/2020/dsa-4601.wml
deleted file mode 100644
index 16179387d5e..00000000000
--- a/korean/security/2020/dsa-4601.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-#use wml::debian::translation-check translation="7d75d8928987af424e3e50ff2103a45da9815c40" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that a hook script of ldm, the display manager for the
-Linux Terminal Server Project, incorrectly parsed responses from an SSH
-server, which could result in local root privilege escalation.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 2:2.2.18-2+deb9u1.</p>
-
-<p>안정배포(buster)에서, 이 문제를 버전 2:2.18.06-1+deb10u1에서 수정했습니다.</p>
-
-<p>ldm 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ldm의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ldm">\
-https://security-tracker.debian.org/tracker/ldm</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4601.data"
diff --git a/korean/security/2020/dsa-4602.wml b/korean/security/2020/dsa-4602.wml
deleted file mode 100644
index 98c2896330b..00000000000
--- a/korean/security/2020/dsa-4602.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-#use wml::debian::translation-check translation="4c0996e191dd68b6dfbadfee3c048714d4cfa961" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, guest-to-host privilege escalation or
-information leaks.</p>
-
-<p>In addition this update provides mitigations for the <q>TSX Asynchronous Abort</q>
-speculative side channel attack. For additional information please refer to
-<a href="https://xenbits.xen.org/xsa/advisory-305.html">https://xenbits.xen.org/xsa/advisory-305.html</a></p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 4.8.5.final+shim4.10.4-1+deb9u12. Note that this will be the
-last security update for Xen in the oldstable distribution; upstream
-support for the 4.8.x branch ended by the end of December 2019. If you
-rely on security support for your Xen installation an update to the
-stable distribution (buster) is recommended.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 4.11.3+24-g14b62ab3e5-1~deb10u1.</p>
-
-<p>xen 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>xen의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/xen">https://security-tracker.debian.org/tracker/xen</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4602.data"
diff --git a/korean/security/2020/dsa-4603.wml b/korean/security/2020/dsa-4603.wml
index 9c2e9c11ce9..d0d6d2a84b2 100644
--- a/korean/security/2020/dsa-4603.wml
+++ b/korean/security/2020/dsa-4603.wml
@@ -3,10 +3,9 @@
<define-tag moreinfo>
<p>여러 취약점이 Thunderbird에서 발견되어 임의 코드 실행 또는 정보 유출을 일으킬 수 있습니다.</p>
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1:68.4.1-1~deb9u1.</p>
+<p>옛안정 배포(stretch)에서, 이 문제를 버전 1:68.4.1-1~deb9u1에서 수정했습니다.</p>
-<p>안정배포(buster)에서, 이 문제를 버전 1:68.4.1-1~deb10u1에서 수정했습니다.</p>
+<p>안정 배포(buster)에서, 이 문제를 버전 1:68.4.1-1~deb10u1에서 수정했습니다.</p>
<p>thunderbird 패키지를 업그레이드 하는 게 좋습니다.</p>
diff --git a/korean/security/2020/dsa-4604.wml b/korean/security/2020/dsa-4604.wml
deleted file mode 100644
index 91d2f911ac5..00000000000
--- a/korean/security/2020/dsa-4604.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-#use wml::debian::translation-check translation="73b976c71b8b4c13c331a478bd9111aa6f64627e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been found in cacti, a server monitoring system,
-potentially resulting in SQL code execution or information disclosure by
-authenticated users.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16723">CVE-2019-16723</a>
-
- <p>Authenticated users may bypass authorization checks for viewing a graph
- by submitting requests with modified local_graph_id parameters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17357">CVE-2019-17357</a>
-
- <p>The graph administration interface insufficiently sanitizes the
- template_id parameter, potentially resulting in SQL injection. This
- vulnerability might be leveraged by authenticated attackers to perform
- unauthorized SQL code execution on the database.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17358">CVE-2019-17358</a>
-
- <p>The sanitize_unserialize_selected_items function (lib/functions.php)
- insufficiently sanitizes user input before deserializing it,
- potentially resulting in unsafe deserialization of user-controlled
- data. This vulnerability might be leveraged by authenticated attackers
- to influence the program control flow or cause memory corruption.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 0.8.8h+ds1-10+deb9u1. Note that stretch was only affected by
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-17358">CVE-2018-17358</a>.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1.2.2+ds1-2+deb10u2.</p>
-
-<p>cacti 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of cacti please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cacti">\
-https://security-tracker.debian.org/tracker/cacti</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4604.data"
diff --git a/korean/security/2020/dsa-4605.wml b/korean/security/2020/dsa-4605.wml
deleted file mode 100644
index c4991297ed8..00000000000
--- a/korean/security/2020/dsa-4605.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="f63afc8ad74e4e06be31ba0f4afdb777d0097a69" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java
-runtime, resulting in denial of service, incorrect implementation of
-Kerberos GSSAPI and TGS requests or incorrect TLS handshakes.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 11.0.6+10-1~deb10u1.</p>
-
-<p>openjdk-11 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of openjdk-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-11">\
-https://security-tracker.debian.org/tracker/openjdk-11</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4605.data"
diff --git a/korean/security/2020/dsa-4606.wml b/korean/security/2020/dsa-4606.wml
deleted file mode 100644
index 77e214f5c05..00000000000
--- a/korean/security/2020/dsa-4606.wml
+++ /dev/null
@@ -1,205 +0,0 @@
-#use wml::debian::translation-check translation="dca7d154a9aa9b577d941477e201293dd96b6dbc" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>chromium 웹 브라우저에서 여러 취약점을 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13725">CVE-2019-13725</a>
-
- <p>Gengming Liu and Jianyu Chen discovered a use-after-free issue in the
- bluetooth implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13726">CVE-2019-13726</a>
-
- <p>Sergei Glazunov discovered a buffer overflow issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13727">CVE-2019-13727</a>
-
- <p>@piochu discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13728">CVE-2019-13728</a>
-
- <p>Rong Jian and Guang Gong discovered an out-of-bounds write error in the
- v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13729">CVE-2019-13729</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13730">CVE-2019-13730</a>
-
- <p>Soyeon Park and Wen Xu discovered the use of a wrong type in the v8
- javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13732">CVE-2019-13732</a>
-
- <p>Sergei Glazunov discovered a use-after-free issue in the WebAudio
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13734">CVE-2019-13734</a>
-
- <p>Wenxiang Qian discovered an out-of-bounds write issue in the sqlite
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13735">CVE-2019-13735</a>
-
- <p>Gengming Liu and Zhen Feng discovered an out-of-bounds write issue in the
- v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13736">CVE-2019-13736</a>
-
- <p>An integer overflow issue was discovered in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13737">CVE-2019-13737</a>
-
- <p>Mark Amery discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13738">CVE-2019-13738</a>
-
- <p>Johnathan Norman and Daniel Clark discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13739">CVE-2019-13739</a>
-
- <p>xisigr discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13740">CVE-2019-13740</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13741">CVE-2019-13741</a>
-
- <p>Michał Bentkowski discovered that user input could be incompletely
- validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13742">CVE-2019-13742</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13743">CVE-2019-13743</a>
-
- <p>Zhiyang Zeng discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13744">CVE-2019-13744</a>
-
- <p>Prakash discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13745">CVE-2019-13745</a>
-
- <p>Luan Herrera discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13746">CVE-2019-13746</a>
-
- <p>David Erceg discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13747">CVE-2019-13747</a>
-
- <p>Ivan Popelyshev and André Bonatti discovered an uninitialized value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13748">CVE-2019-13748</a>
-
- <p>David Erceg discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13749">CVE-2019-13749</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13750">CVE-2019-13750</a>
-
- <p>Wenxiang Qian discovered insufficient validation of data in the sqlite
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13751">CVE-2019-13751</a>
-
- <p>Wenxiang Qian discovered an uninitialized value in the sqlite library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13752">CVE-2019-13752</a>
-
- <p>Wenxiang Qian discovered an out-of-bounds read issue in the sqlite
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13753">CVE-2019-13753</a>
-
- <p>Wenxiang Qian discovered an out-of-bounds read issue in the sqlite
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13754">CVE-2019-13754</a>
-
- <p>Cody Crews discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13755">CVE-2019-13755</a>
-
- <p>Masato Kinugawa discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13756">CVE-2019-13756</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13757">CVE-2019-13757</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13758">CVE-2019-13758</a>
-
- <p>Khalil Zhani discovered a policy enforecement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13759">CVE-2019-13759</a>
-
- <p>Wenxu Wu discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13761">CVE-2019-13761</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13762">CVE-2019-13762</a>
-
- <p>csanuragjain discovered a policy enforecement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13763">CVE-2019-13763</a>
-
- <p>weiwangpp93 discovered a policy enforecement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13764">CVE-2019-13764</a>
-
- <p>Soyeon Park and Wen Xu discovered the use of a wrong type in the v8
- javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13767">CVE-2019-13767</a>
-
- <p>Sergei Glazunov discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6377">CVE-2020-6377</a>
-
- <p>Zhe Jin discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6378">CVE-2020-6378</a>
-
- <p>Antti Levomäki and Christian Jalio discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6379">CVE-2020-6379</a>
-
- <p>Guang Gong discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6380">CVE-2020-6380</a>
-
- <p>Sergei Glazunov discovered an error verifying extension messages.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), security support for chromium has
-been discontinued.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 79.0.3945.130-1~deb10u1.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of chromium please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4606.data"
diff --git a/korean/security/2020/dsa-4607.wml b/korean/security/2020/dsa-4607.wml
deleted file mode 100644
index c857958982b..00000000000
--- a/korean/security/2020/dsa-4607.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="54ed69c467a43952f4d70f1aaf9fbc9a5d4b6fcd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP
-in openconnect, an open client for Cisco AnyConnect, Pulse and
-GlobalProtect VPN. A malicious HTTP server (after having accepted its
-identity certificate), can provide bogus chunk lengths for chunked HTTP
-encoding and cause a heap-based buffer overflow.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 7.08-1+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 8.02-1+deb10u1.</p>
-
-<p>openconnect 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of openconnect please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openconnect">https://security-tracker.debian.org/tracker/openconnect</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4607.data"
diff --git a/korean/security/2020/dsa-4608.wml b/korean/security/2020/dsa-4608.wml
deleted file mode 100644
index 962403250b5..00000000000
--- a/korean/security/2020/dsa-4608.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="c61db2c587e6eed3dcf7c02b4a7f4500c4561841" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple integer overflows have been discovered in the libtiff library
-and the included tools.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 4.1.0+git191117-2~deb10u1.</p>
-
-<p>tiff 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>tiff의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/tiff">\
-https://security-tracker.debian.org/tracker/tiff</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4608.data"
diff --git a/korean/security/2020/dsa-4609.wml b/korean/security/2020/dsa-4609.wml
deleted file mode 100644
index 04260ca33dd..00000000000
--- a/korean/security/2020/dsa-4609.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="f744d49feeb6c6afe3a22a3ed5e2a43eefbe3d46" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were found in the Python interface to the apt
-package manager; package downloads from unsigned repositories were
-incorrectly rejected and the hash validation relied on MD5.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1.4.1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1.8.4.1.</p>
-
-<p>python-apt 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-apt의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-apt">\
-https://security-tracker.debian.org/tracker/python-apt</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4609.data"
diff --git a/korean/security/2020/dsa-4612.wml b/korean/security/2020/dsa-4612.wml
deleted file mode 100644
index c9a55e29837..00000000000
--- a/korean/security/2020/dsa-4612.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="fb7d29f63f0954976c5fc7cf9c9bddd6cbb49710" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the LDAP authentication modules for the Prosody
-Jabber/XMPP server incorrectly validated the XMPP address when checking
-whether a user has admin access.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 0.0~hg20170123.3ed504b944e5+dfsg-1+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 0.0~hg20190203.b54e98d5c4a1+dfsg-1+deb10u1.</p>
-
-<p>prosody-modules 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>prosody-modules의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/prosody-modules">\
-https://security-tracker.debian.org/tracker/prosody-modules</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4612.data"
diff --git a/korean/security/2020/dsa-4613.wml b/korean/security/2020/dsa-4613.wml
deleted file mode 100644
index 98e6463149a..00000000000
--- a/korean/security/2020/dsa-4613.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="e25d434dcac8f08adc70199ce09f30f14d4e8555" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer overflow vulnerability was discovered in the
-idn2_to_ascii_4i() function in libidn2, the GNU library for
-Internationalized Domain Names (IDNs), which could result in denial of
-service, or the execution of arbitrary code when processing a long
-domain string.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 2.0.5-1+deb10u1.</p>
-
-<p>libidn2를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of libidn2 please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libidn2">\
-https://security-tracker.debian.org/tracker/libidn2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4613.data"
diff --git a/korean/security/2020/dsa-4614.wml b/korean/security/2020/dsa-4614.wml
deleted file mode 100644
index 56006655443..00000000000
--- a/korean/security/2020/dsa-4614.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-#use wml::debian::translation-check translation="10d6441f58b80849b1c23b3599dafc9a773a04f2" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Joe Vennix discovered a stack-based buffer overflow vulnerability in
-sudo, a program designed to provide limited super user privileges to
-specific users, triggerable when configured with the <q>pwfeedback</q> option
-enabled. An unprivileged user can take advantage of this flaw to obtain
-full root privileges.</p>
-
-<p>Details can be found in the upstream advisory at
-<a href="https://www.sudo.ws/alerts/pwfeedback.html">https://www.sudo.ws/alerts/pwfeedback.html</a> .</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.8.19p1-2.1+deb9u2.</p>
-
-<p>For the stable distribution (buster), exploitation of the bug is
-prevented due to a change in EOF handling introduced in 1.8.26.</p>
-
-<p>sudo 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of sudo please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sudo">https://security-tracker.debian.org/tracker/sudo</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4614.data"
diff --git a/korean/security/2020/dsa-4615.wml b/korean/security/2020/dsa-4615.wml
deleted file mode 100644
index aeb39c0f283..00000000000
--- a/korean/security/2020/dsa-4615.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="cc26fa4daf1ca0a0ad161b8f9a5b226f730a186c" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in spamassassin, a Perl-based spam
-filter using text analysis. Malicious rule or configuration files,
-possibly downloaded from an updates server, could execute arbitrary
-commands under multiple scenarios.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.4.2-1~deb9u3.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 3.4.2-1+deb10u2.</p>
-
-<p>spamassassin 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of spamassassin please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spamassassin">https://security-tracker.debian.org/tracker/spamassassin</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4615.data"
diff --git a/korean/security/2020/dsa-4616.wml b/korean/security/2020/dsa-4616.wml
deleted file mode 100644
index 4f3dfb83405..00000000000
--- a/korean/security/2020/dsa-4616.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="15dec87b51ed957e42773ff91217a26555cc3465" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been found in the SLiRP networking
-implementation of QEMU, a fast processor emulator, which could result
-in the execution of arbitrary code or denial of service.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1:2.8+dfsg-6+deb9u9.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1:3.1+dfsg-8+deb10u4.</p>
-
-<p>qemu 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">\
-https://security-tracker.debian.org/tracker/qemu</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4616.data"
diff --git a/korean/security/2020/dsa-4617.wml b/korean/security/2020/dsa-4617.wml
deleted file mode 100644
index 3ad672cf7f5..00000000000
--- a/korean/security/2020/dsa-4617.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="446ba0301e18f9722b30306206b2c61e7c957ed8" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were found in the Qt library, which could result in
-plugins and libraries being loaded from the current working directory,
-resulting in potential code execution.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 5.7.1+dfsg-3+deb9u2.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 5.11.3+dfsg1-1+deb10u3.</p>
-
-<p>qtbase-opensource-src 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>qtbase-opensource-src의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/qtbase-opensource-src">\
-https://security-tracker.debian.org/tracker/qtbase-opensource-src</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4617.data"
diff --git a/korean/security/2020/dsa-4618.wml b/korean/security/2020/dsa-4618.wml
deleted file mode 100644
index 57491355d10..00000000000
--- a/korean/security/2020/dsa-4618.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="3ad892d074815a517f2a1d8ec799fa696a08d752" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds write vulnerability due to an integer overflow was
-reported in libexif, a library to parse EXIF files, which could result
-in denial of service, or potentially the execution of arbitrary code if
-specially crafted image files are processed.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 0.6.21-2+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 0.6.21-5.1+deb10u1.</p>
-
-<p>libexif 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libexif의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libexif">https://security-tracker.debian.org/tracker/libexif</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4618.data"
diff --git a/korean/security/2020/dsa-4619.wml b/korean/security/2020/dsa-4619.wml
deleted file mode 100644
index b31bf474d75..00000000000
--- a/korean/security/2020/dsa-4619.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-#use wml::debian::translation-check translation="abccef21651668bce87fe0103d623399ffd369cd" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Guillaume Teissier reported that the XMLRPC client in libxmlrpc3-java,
-an XML-RPC implementation in Java, does perform deserialization of the
-server-side exception serialized in the faultCause attribute of XMLRPC
-error response messages. A malicious XMLRPC server can take advantage of
-this flaw to execute arbitrary code with the privileges of an
-application using the Apache XMLRPC client library.</p>
-
-<p>Note that a client that expects to get server-side exceptions need to
-set explicitly the enabledForExceptions property.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 3.1.3-8+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 3.1.3-9+deb10u1.</p>
-
-<p>libxmlrpc3-java 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>libxmlrpc3-java 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/libxmlrpc3-java">https://security-tracker.debian.org/tracker/libxmlrpc3-java</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4619.data"
diff --git a/korean/security/2020/dsa-4620.wml b/korean/security/2020/dsa-4620.wml
deleted file mode 100644
index 71802250f57..00000000000
--- a/korean/security/2020/dsa-4620.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="fcaa4a008ecfa168724ebd844e253d66450b96d3" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 68.5.0esr-1~deb9u1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 68.5.0esr-1~deb10u1.</p>
-
-<p>firefox-esr 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>firefox-esr 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4620.data"
diff --git a/korean/security/2020/dsa-4621.wml b/korean/security/2020/dsa-4621.wml
deleted file mode 100644
index 361c229beac..00000000000
--- a/korean/security/2020/dsa-4621.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="8e8c01053acfcad3b37f0c4932fbaf9682de2121" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-resulting in denial of service, incorrect implementation of Kerberos
-GSSAPI and TGS requests or incorrect TLS handshakes.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 8u242-b08-1~deb9u1.</p>
-
-<p>openjdk-8 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">\
-https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4621.data"
diff --git a/korean/security/2020/dsa-4622.wml b/korean/security/2020/dsa-4622.wml
deleted file mode 100644
index cb6d85d45db..00000000000
--- a/korean/security/2020/dsa-4622.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="d568552e131ea2c7ea7f32112237692071899e0b" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Tom Lane discovered that <q>ALTER ... DEPENDS ON EXTENSION</q> sub commands
-in the PostgreSQL database did not perform authorisation checks.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 9.6.17-0+deb9u1.</p>
-
-<p>postgresql-9.6 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of postgresql-9.6 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">\
-https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4622.data"
diff --git a/korean/security/2020/dsa-4623.wml b/korean/security/2020/dsa-4623.wml
deleted file mode 100644
index fa774c078aa..00000000000
--- a/korean/security/2020/dsa-4623.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="68e58f55529766dd62029fba99d7b7a4fad42ba0" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Tom Lane discovered that <q>ALTER ... DEPENDS ON EXTENSION</q> sub commands
-in the PostgreSQL database did not perform authorisation checks.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 11.7-0+deb10u1.</p>
-
-<p>postgresql-11 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>postgresql-11의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">\
-https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4623.data"
diff --git a/korean/security/2020/dsa-4624.wml b/korean/security/2020/dsa-4624.wml
deleted file mode 100644
index 2b9378d424d..00000000000
--- a/korean/security/2020/dsa-4624.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-#use wml::debian::translation-check translation="8be684d647389ee3db99d941206fa9b5cbef2621" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 evince에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000159">CVE-2017-1000159</a>
-
- <p>Tobias Mueller reported that the DVI exporter in evince is
- susceptible to a command injection vulnerability via specially
- crafted filenames.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11459">CVE-2019-11459</a>
-
- <p>Andy Nguyen reported that the tiff_document_render() and
- tiff_document_get_thumbnail() functions in the TIFF document backend
- did not handle errors from TIFFReadRGBAImageOriented(), leading to
- disclosure of uninitialized memory when processing TIFF image files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010006">CVE-2019-1010006</a>
-
- <p>A buffer overflow vulnerability in the tiff backend could lead to
- denial of service, or potentially the execution of arbitrary code if
- a specially crafted PDF file is opened.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 3.22.1-3+deb9u2.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 3.30.2-3+deb10u1. The stable distribution is only affected by
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-11459">CVE-2019-11459</a>.</p>
-
-<p>evince 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>evince의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/evince">https://security-tracker.debian.org/tracker/evince</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4624.data"
diff --git a/korean/security/2020/dsa-4626.wml b/korean/security/2020/dsa-4626.wml
deleted file mode 100644
index 814b1c737b4..00000000000
--- a/korean/security/2020/dsa-4626.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="f97e30bee8650c46bc061487771c3025e2149195" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in PHP, a widely-used open source
-general purpose scripting language which could result in information
-disclosure, denial of service or incorrect validation of path names.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 7.3.14-1~deb10u1.</p>
-
-<p>php7.3 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>php7.3 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/php7.3">\
-https://security-tracker.debian.org/tracker/php7.3</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4626.data"
diff --git a/korean/security/2020/dsa-4627.wml b/korean/security/2020/dsa-4627.wml
deleted file mode 100644
index be755bd3532..00000000000
--- a/korean/security/2020/dsa-4627.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-#use wml::debian::translation-check translation="0f2e63875207f63029067f8878524f544b09a20f" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 webkit2gtk에서 발견:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3862">CVE-2020-3862</a>
-
- <p>Srikanth Gatta discovered that a malicious website may be able to
- cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3864">CVE-2020-3864</a>
-
- <p>Ryan Pickren discovered that a DOM object context may not have had
- a unique security origin.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3865">CVE-2020-3865</a>
-
- <p>Ryan Pickren discovered that a top-level DOM object context may
- have incorrectly been considered secure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3867">CVE-2020-3867</a>
-
- <p>An anonymous researcher discovered that processing maliciously
- crafted web content may lead to universal cross site scripting.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3868">CVE-2020-3868</a>
-
- <p>Marcin Towalski discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-</ul>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 2.26.4-1~deb10u1.</p>
-
-<p>webkit2gtk 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">\
-https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4627.data"
diff --git a/korean/security/2020/dsa-4628.wml b/korean/security/2020/dsa-4628.wml
deleted file mode 100644
index 6b40b4ecb08..00000000000
--- a/korean/security/2020/dsa-4628.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="5e72e7cfa1106f51c16e8eb44102aa43243e88f1" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in PHP, a widely-used open source
-general purpose scripting language which could result in information
-disclosure, denial of service or incorrect validation of path names.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 7.0.33-0+deb9u7.</p>
-
-<p>php7.0 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.0">\
-https://security-tracker.debian.org/tracker/php7.0</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4628.data"
diff --git a/korean/security/2020/dsa-4629.wml b/korean/security/2020/dsa-4629.wml
deleted file mode 100644
index 9ee55a3eb43..00000000000
--- a/korean/security/2020/dsa-4629.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="cd250cac3ca11107f1d1af9d00f8407531004d81" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Simon Charette discovered that Django, a high-level Python web
-development framework, did not properly handle input in its PostgreSQL
-module. A remote attacker could leverage this to perform SQL injection
-attacks.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1:1.10.7-2+deb9u8.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1:1.11.28-1~deb10u1.</p>
-
-<p>python-django 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-django 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-django">\
-https://security-tracker.debian.org/tracker/python-django</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4629.data"
diff --git a/korean/security/2020/dsa-4630.wml b/korean/security/2020/dsa-4630.wml
deleted file mode 100644
index 07add75f43a..00000000000
--- a/korean/security/2020/dsa-4630.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="7f18674eb2f19afa8777c4d720d6e52061da0bb6" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that pysaml2, a Python implementation of SAML to be
-used in a WSGI environment, was susceptible to XML signature wrapping
-attacks, which could result in a bypass of signature verification.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 3.0.0-5+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 5.4.1-2+deb10u1.</p>
-
-<p>python-pysaml2 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-pysaml2의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-pysaml2">\
-https://security-tracker.debian.org/tracker/python-pysaml2</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4630.data"
diff --git a/korean/security/2020/dsa-4631.wml b/korean/security/2020/dsa-4631.wml
deleted file mode 100644
index edf4793d607..00000000000
--- a/korean/security/2020/dsa-4631.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="93558736384fe023d7def535cc056a4a2fef410a" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Pillow, a Python imaging
-library, which could result in denial of service and potentially the
-execution of arbitrary code if malformed PCX, FLI, SGI or TIFF images
-are processed.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 4.0.0-4+deb9u1.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 5.4.1-2+deb10u1.</p>
-
-<p>pillow 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>pillow의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/pillow">\
-https://security-tracker.debian.org/tracker/pillow</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4631.data"
diff --git a/korean/security/2020/dsa-4632.wml b/korean/security/2020/dsa-4632.wml
deleted file mode 100644
index 0b8a2f4e463..00000000000
--- a/korean/security/2020/dsa-4632.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="dd1afb1cf904bbbb51ea66428499297bc19ade13" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Ilja Van Sprundel reported a logic flaw in the Extensible Authentication
-Protocol (EAP) packet parser in the Point-to-Point Protocol Daemon
-(pppd). An unauthenticated attacker can take advantage of this flaw to
-trigger a stack-based buffer overflow, leading to denial of service
-(pppd daemon crash).</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 2.4.7-1+4+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 2.4.7-2+4.1+deb10u1.</p>
-
-<p>ppp 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>ppp의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/ppp">https://security-tracker.debian.org/tracker/ppp</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4632.data"
diff --git a/korean/security/2020/dsa-4633.wml b/korean/security/2020/dsa-4633.wml
deleted file mode 100644
index 68a53d275d6..00000000000
--- a/korean/security/2020/dsa-4633.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-#use wml::debian::translation-check translation="d3f29d8015c29a9da9f70c50fcc3cb13a49a95c7" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 cURL에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5436">CVE-2019-5436</a>
-
- <p>A heap buffer overflow in the TFTP receiving code was discovered,
- which could allow DoS or arbitrary code execution. This only affects
- the oldstable distribution (stretch).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5481">CVE-2019-5481</a>
-
- <p>Thomas Vegas discovered a double-free in the FTP-KRB code, triggered
- by a malicious server sending a very large data block.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5482">CVE-2019-5482</a>
-
- <p>Thomas Vegas discovered a heap buffer overflow that could be
- triggered when a small non-default TFTP blocksize is used.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 7.52.1-5+deb9u10.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 7.64.0-4+deb10u1.</p>
-
-<p>curl 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>curl의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/curl">\
-https://security-tracker.debian.org/tracker/curl</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4633.data"
diff --git a/korean/security/2020/dsa-4634.wml b/korean/security/2020/dsa-4634.wml
deleted file mode 100644
index e209937446d..00000000000
--- a/korean/security/2020/dsa-4634.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="2a240813094d4a13de048c985345c3077a3c3795" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Qualys discovered that the OpenSMTPD SMTP server performed insufficient
-validation of SMTP commands, which could result in local privilege
-escalation or the execution of arbitrary code.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 6.0.2p1-2+deb9u3.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 6.0.3p1-5+deb10u4.</p>
-
-<p>opensmtpd 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>opensmtpd의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/opensmtpd">\
-https://security-tracker.debian.org/tracker/opensmtpd</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4634.data"
diff --git a/korean/security/2020/dsa-4635.wml b/korean/security/2020/dsa-4635.wml
deleted file mode 100644
index c042883bcee..00000000000
--- a/korean/security/2020/dsa-4635.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="9539f4e7de197a7f0021a734f0dc306700d58c9e" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Antonio Morales discovered an user-after-free flaw in the memory pool
-allocator in ProFTPD, a powerful modular FTP/SFTP/FTPS server.
-Interrupting current data transfers can corrupt the ProFTPD memory pool,
-leading to denial of service, or potentially the execution of arbitrary
-code.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.3.5b-4+deb9u4.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.3.6-4+deb10u4.</p>
-
-<p>proftpd-dfsg 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>proftpd-dfsg의 자세한 보안 생태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/proftpd-dfsg">https://security-tracker.debian.org/tracker/proftpd-dfsg</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4635.data"
diff --git a/korean/security/2020/dsa-4636.wml b/korean/security/2020/dsa-4636.wml
deleted file mode 100644
index 0470de9bff2..00000000000
--- a/korean/security/2020/dsa-4636.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="6a986dff4e03b3c164266e2fa4cba83cee0f3c2b" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>It was reported that python-bleach, a whitelist-based HTML-sanitizing
-library, is prone to a mutation XSS vulnerability in bleach.clean when
-<q>noscript</q> and one or more raw text tags were whitelisted.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 3.1.1-0+deb10u1.</p>
-
-<p>python-bleach 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>python-bleach의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/python-bleach">https://security-tracker.debian.org/tracker/python-bleach</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4636.data"
diff --git a/korean/security/2020/dsa-4637.wml b/korean/security/2020/dsa-4637.wml
deleted file mode 100644
index 4ede26ab8fa..00000000000
--- a/korean/security/2020/dsa-4637.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-#use wml::debian::translation-check translation="44280ae920ca8f6697eb3d2e55b736bd1753e429" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>Kobus van Schoor discovered that network-manager-ssh, a plugin to
-provide VPN integration for SSH in NetworkManager, is prone to a
-privilege escalation vulnerability. A local user with privileges to
-modify a connection can take advantage of this flaw to execute arbitrary
-commands as root.</p>
-
-<p>This update drops support to pass extra SSH options to the ssh
-invocation.</p>
-
-<p>For the oldstable distribution (stretch), this problem has been fixed
-in version 1.2.1-1+deb9u1.</p>
-
-<p>For the stable distribution (buster), this problem has been fixed in
-version 1.2.10-1+deb10u1.</p>
-
-<p>network-manager-ssh 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>network-manager-ssh 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/network-manager-ssh">https://security-tracker.debian.org/tracker/network-manager-ssh</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4637.data"
diff --git a/korean/security/2020/dsa-4638.wml b/korean/security/2020/dsa-4638.wml
deleted file mode 100644
index ee37963ccd3..00000000000
--- a/korean/security/2020/dsa-4638.wml
+++ /dev/null
@@ -1,204 +0,0 @@
-#use wml::debian::translation-check translation="6fbca817d300a20809fec1f06bb2ae3c92689156" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>여러 취약점을 chromium 웹 브라우저에서 발견했습니다.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19880">CVE-2019-19880</a>
-
- <p>Richard Lorenz discovered an issue in the sqlite library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19923">CVE-2019-19923</a>
-
- <p>Richard Lorenz discovered an out-of-bounds read issue in the sqlite
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19925">CVE-2019-19925</a>
-
- <p>Richard Lorenz discovered an issue in the sqlite library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19926">CVE-2019-19926</a>
-
- <p>Richard Lorenz discovered an implementation error in the sqlite library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6381">CVE-2020-6381</a>
-
- <p>UK's National Cyber Security Centre discovered an integer overflow issue
- in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6382">CVE-2020-6382</a>
-
- <p>Soyeon Park and Wen Xu discovered a type error in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6383">CVE-2020-6383</a>
-
- <p>Sergei Glazunov discovered a type error in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6384">CVE-2020-6384</a>
-
- <p>David Manoucheri discovered a use-after-free issue in WebAudio.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6385">CVE-2020-6385</a>
-
- <p>Sergei Glazunov discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6386">CVE-2020-6386</a>
-
- <p>Zhe Jin discovered a use-after-free issue in speech processing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6387">CVE-2020-6387</a>
-
- <p>Natalie Silvanovich discovered an out-of-bounds write error in the WebRTC
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6388">CVE-2020-6388</a>
-
- <p>Sergei Glazunov discovered an out-of-bounds read error in the WebRTC
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6389">CVE-2020-6389</a>
-
- <p>Natalie Silvanovich discovered an out-of-bounds write error in the WebRTC
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6390">CVE-2020-6390</a>
-
- <p>Sergei Glazunov discovered an out-of-bounds read error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6391">CVE-2020-6391</a>
-
- <p>Michał Bentkowski discoverd that untrusted input was insufficiently
- validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6392">CVE-2020-6392</a>
-
- <p>The Microsoft Edge Team discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6393">CVE-2020-6393</a>
-
- <p>Mark Amery discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6394">CVE-2020-6394</a>
-
- <p>Phil Freo discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6395">CVE-2020-6395</a>
-
- <p>Pierre Langlois discovered an out-of-bounds read error in the v8
- javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6396">CVE-2020-6396</a>
-
- <p>William Luc Ritchie discovered an error in the skia library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6397">CVE-2020-6397</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6398">CVE-2020-6398</a>
-
- <p>pdknsk discovered an uninitialized variable in the pdfium library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6399">CVE-2020-6399</a>
-
- <p>Luan Herrera discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6400">CVE-2020-6400</a>
-
- <p>Takashi Yoneuchi discovered an error in Cross-Origin Resource Sharing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6401">CVE-2020-6401</a>
-
- <p>Tzachy Horesh discovered that user input was insufficiently validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6402">CVE-2020-6402</a>
-
- <p>Vladimir Metnew discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6403">CVE-2020-6403</a>
-
- <p>Khalil Zhani discovered a user interface error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6404">CVE-2020-6404</a>
-
- <p>kanchi discovered an error in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6405">CVE-2020-6405</a>
-
- <p>Yongheng Chen and Rui Zhong discovered an out-of-bounds read issue in the
- sqlite library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6406">CVE-2020-6406</a>
-
- <p>Sergei Glazunov discovered a use-after-free issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6407">CVE-2020-6407</a>
-
- <p>Sergei Glazunov discovered an out-of-bounds read error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6408">CVE-2020-6408</a>
-
- <p>Zhong Zhaochen discovered a policy enforcement error in Cross-Origin
- Resource Sharing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6409">CVE-2020-6409</a>
-
- <p>Divagar S and Bharathi V discovered an error in the omnibox
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6410">CVE-2020-6410</a>
-
- <p>evil1m0 discovered a policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6411">CVE-2020-6411</a>
-
- <p>Khalil Zhani discovered that user input was insufficiently validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6412">CVE-2020-6412</a>
-
- <p>Zihan Zheng discovered that user input was insufficiently validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6413">CVE-2020-6413</a>
-
- <p>Michał Bentkowski discovered an error in Blink/Webkit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6414">CVE-2020-6414</a>
-
- <p>Lijo A.T discovered a policy safe browsing policy enforcement error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6415">CVE-2020-6415</a>
-
- <p>Avihay Cohen discovered an implementation error in the v8 javascript
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6416">CVE-2020-6416</a>
-
- <p>Woojin Oh discovered that untrusted input was insufficiently validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6418">CVE-2020-6418</a>
-
- <p>Clement Lecigne discovered a type error in the v8 javascript library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6420">CVE-2020-6420</a>
-
- <p>Taras Uzdenov discovered a policy enforcement error.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (stretch), security support for chromium has
-been discontinued.</p>
-
-<p>안정(buster)배포에서, 이 문제를 버전 80.0.3987.132-1~deb10u1에서 수정했습니다.</p>
-
-<p>chromium 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>chromium의 자세한 보안 상태는 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4638.data"
diff --git a/korean/security/2020/dsa-4640.wml b/korean/security/2020/dsa-4640.wml
deleted file mode 100644
index d5e26e828ed..00000000000
--- a/korean/security/2020/dsa-4640.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="388f5519902c3f6cf8f4f4654c97a24e656f4688" maintainer="Sebul" mindelta="-1"
-# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
-<define-tag description>보안 업데이트</define-tag>
-<define-tag moreinfo>
-<p>이 업데이트는 Graphicsmagick의 여러 취약점을 수정했습니다: Various memory
-handling problems and cases of missing or incomplete input sanitising
-may result in denial of service, memory disclosure or the execution
-of arbitrary code if malformed media files are processed.</p>
-
-<p>For the oldstable distribution (stretch), these problems have been fixed
-in version 1.3.30+hg15796-1~deb9u3.</p>
-
-<p>For the stable distribution (buster), these problems have been fixed in
-version 1.4~hg15978-1+deb10u1.</p>
-
-<p>graphicsmagick 패키지를 업그레이드 하는 게 좋습니다.</p>
-
-<p>graphicsmagick의 자세한 보안 추적 페이지를 참조하십시오:
-<a href="https://security-tracker.debian.org/tracker/graphicsmagick">\
-https://security-tracker.debian.org/tracker/graphicsmagick</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2020/dsa-4640.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy