From 6884fab3f711ad40aa53bfa3a206ddd190379f282ed89206fbf6ea9376cd3420 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ond=C5=99ej=20S=C3=BAkup?= Date: Sun, 29 Dec 2019 11:44:48 +0000 Subject: [PATCH] * CVE-2019-19844: Potential account hijack via password reset form (bsc#1159447) OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=48 --- python-Django.changes | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/python-Django.changes b/python-Django.changes index e562ced..a6c4053 100644 --- a/python-Django.changes +++ b/python-Django.changes @@ -2,7 +2,7 @@ Sun Dec 29 11:00:47 UTC 2019 - Ondřej Súkup - Update to 2.2.9 - * CVE-2019--19844: Potential account hijack via password reset form (bsc#1156447) + * CVE-2019-19844: Potential account hijack via password reset form (bsc#1159447) * Fixed a data loss possibility in SplitArrayField. -------------------------------------------------------------------