File _patchinfo of Package patchinfo.50
<patchinfo>
<category>security</category>
<rating>moderate</rating>
<packager>lnussel</packager>
<description>NetworkManager did not pin a certificate's subject to an ESSID. A rogue access
point could therefore be used to conduct MITM attacks by using any other valid
certificate issued by same CA as used in the original network (CVE-2006-7246).
Please note that existing WPA2 Enterprise connections need to be deleted and
re-created to take advantage of the new security checks.
</description>
<summary>update for NetworkManager-gnome, NetworkManager, wpa_supplicant, gnome-control-center</summary>
<issue id="574266" tracker="bnc"/>
<issue id="CVE-2006-7246" tracker="CVE"/>
<reboot_needed/></patchinfo>