On 2021-01-19 12:37 p.m., Leon Anavi wrote:
- A vulnerability (CVE-2020-27783) was discovered in the HTML
  Cleaner by Yaniv Nizry, which allowed JavaScript to pass
  through. The cleaner now removes more sneaky "style" content.

Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
Acked-by: Trevor Gamblin <trevor.gamblin@windriver.com>
---
 .../python/{python3-lxml_4.6.1.bb => python3-lxml_4.6.2.bb}    | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)
 rename meta-python/recipes-devtools/python/{python3-lxml_4.6.1.bb => python3-lxml_4.6.2.bb} (93%)

diff --git a/meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb b/meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
similarity index 93%
rename from meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
rename to meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
index af012e630..f7aed6d77 100644
--- a/meta-python/recipes-devtools/python/python3-lxml_4.6.1.bb
+++ b/meta-python/recipes-devtools/python/python3-lxml_4.6.2.bb
@@ -18,8 +18,7 @@ LIC_FILES_CHKSUM = "file://LICENSES.txt;md5=e4c045ebad958ead4b48008f70838403 \
 
 DEPENDS += "libxml2 libxslt"
 
-SRC_URI[md5sum] = "10924ab543397a06cb4cfaf9bdf0b80f"
-SRC_URI[sha256sum] = "c152b2e93b639d1f36ec5a8ca24cde4a8eefb2b6b83668fcd8e83a67badcb367"
+SRC_URI[sha256sum] = "cd11c7e8d21af997ee8079037fff88f16fda188a9776eb4b81c7e4c9c0a7d7fc"
 
 inherit pypi setuptools3