On 2021-01-19 12:37 p.m., Leon Anavi wrote:
- A vulnerability (CVE-2020-27783) was discovered in the HTML
   Cleaner by Yaniv Nizry, which allowed JavaScript to pass
   through. The cleaner now removes more sneaky "style" content.

Signed-off-by: Leon Anavi <[email protected]>
Acked-by: Trevor Gamblin <[email protected]>
---
  .../python/{python3-lxml_4.6.1.bb => python3-lxml_4.6.2.bb}    | 3 +--
  1 file changed, 1 insertion(+), 2 deletions(-)
  rename meta-python/recipes-devtools/python/{python3-lxml_4.6.1.bb => 
python3-lxml_4.6.2.bb} (93%)

diff --git a/meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb 
b/meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
similarity index 93%
rename from meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
rename to meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
index af012e630..f7aed6d77 100644
--- a/meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
+++ b/meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
@@ -18,8 +18,7 @@ LIC_FILES_CHKSUM = 
"file://LICENSES.txt;md5=e4c045ebad958ead4b48008f70838403 \
DEPENDS += "libxml2 libxslt" -SRC_URI[md5sum] = "10924ab543397a06cb4cfaf9bdf0b80f"
-SRC_URI[sha256sum] = 
"c152b2e93b639d1f36ec5a8ca24cde4a8eefb2b6b83668fcd8e83a67badcb367"
+SRC_URI[sha256sum] = 
"cd11c7e8d21af997ee8079037fff88f16fda188a9776eb4b81c7e4c9c0a7d7fc"
inherit pypi setuptools3


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#88918): 
https://lists.openembedded.org/g/openembedded-devel/message/88918
Mute This Topic: https://lists.openembedded.org/mt/79957404/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to