File _patchinfo of Package patchinfo.import5627

<patchinfo incident="NetworkManager-gnome" version="5627">
  <issue tracker="bnc" id="574266" />
  <issue tracker="bnc" id="732700" />
  <category>security</category>
  <rating>low</rating>
  <summary>NetworkManager-gnome security update</summary>
  <description>NetworkManager did not pin a certificate's subject to an
ESSID. A rogue access point could therefore be used to
conduct MITM attacks by using any other valid certificate
issued by same CA as used in the original network
(CVE-2006-7246).

Please note that  existing WPA2 Enterprise connections need
to be deleted and re-created to take advantage of the new
security checks. 

This is a re-release of the previous update to also enable
the checks for EAP-TLS.
</description>
  <packager>adrianSuSE</packager>
</patchinfo>
openSUSE Build Service is sponsored by