NetworkManager-gnome security update

NetworkManager did not pin a certificate's subject to an
ESSID. A rogue access point could therefore be used to
conduct MITM attacks by using any other valid certificate
issued by same CA as used in the original network
(CVE-2006-7246).

Please note that existing WPA2 Enterprise connections need
to be deleted and re-created to take advantage of the new
security checks.

This is a re-release of the previous update to also enable
the checks for EAP-TLS.

Fixed bugs
bnc#574266
VUL-0: NetworkManager unsafe for WPA2 Enterprise networks
bnc#732700
String "Note" in nm-connection-editor
Selected Binaries
openSUSE Build Service is sponsored by