File _patchinfo of Package patchinfo.import5627
<patchinfo incident="NetworkManager-gnome" version="5627"> <issue tracker="bnc" id="574266" /> <issue tracker="bnc" id="732700" /> <category>security</category> <rating>low</rating> <summary>NetworkManager-gnome security update</summary> <description>NetworkManager did not pin a certificate's subject to an ESSID. A rogue access point could therefore be used to conduct MITM attacks by using any other valid certificate issued by same CA as used in the original network (CVE-2006-7246). Please note that existing WPA2 Enterprise connections need to be deleted and re-created to take advantage of the new security checks. This is a re-release of the previous update to also enable the checks for EAP-TLS. </description> <packager>adrianSuSE</packager> </patchinfo>