On 2021-01-19 12:37 p.m., Leon Anavi wrote:
- A vulnerability (CVE-2020-27783) was discovered in the HTML
Cleaner by Yaniv Nizry, which allowed JavaScript to pass
through. The cleaner now removes more sneaky "style" content.
Signed-off-by: Leon Anavi <[email protected]>
Acked-by: Trevor Gamblin <[email protected]>
---
.../python/{python3-lxml_4.6.1.bb => python3-lxml_4.6.2.bb} | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
rename meta-python/recipes-devtools/python/{python3-lxml_4.6.1.bb =>
python3-lxml_4.6.2.bb} (93%)
diff --git a/meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
b/meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
similarity index 93%
rename from meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
rename to meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
index af012e630..f7aed6d77 100644
--- a/meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
+++ b/meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
@@ -18,8 +18,7 @@ LIC_FILES_CHKSUM =
"file://LICENSES.txt;md5=e4c045ebad958ead4b48008f70838403 \
DEPENDS += "libxml2 libxslt"
-SRC_URI[md5sum] = "10924ab543397a06cb4cfaf9bdf0b80f"
-SRC_URI[sha256sum] =
"c152b2e93b639d1f36ec5a8ca24cde4a8eefb2b6b83668fcd8e83a67badcb367"
+SRC_URI[sha256sum] =
"cd11c7e8d21af997ee8079037fff88f16fda188a9776eb4b81c7e4c9c0a7d7fc"
inherit pypi setuptools3
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#88918):
https://lists.openembedded.org/g/openembedded-devel/message/88918
Mute This Topic: https://lists.openembedded.org/mt/79957404/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-