File _patchinfo of Package patchinfo.50

<patchinfo>
  
  <category>security</category>
  <rating>moderate</rating>
  <packager>lnussel</packager>
  <description>NetworkManager did not pin a certificate's subject to an ESSID. A rogue access
point could therefore be used to conduct MITM attacks by using any other valid
certificate issued by same CA as used in the original network (CVE-2006-7246).

Please note that existing WPA2 Enterprise connections need to be deleted and
re-created to take advantage of the new security checks.
</description>
  <summary>update for NetworkManager-gnome, NetworkManager, wpa_supplicant, gnome-control-center</summary>
<issue id="574266" tracker="bnc"/>
<issue id="CVE-2006-7246" tracker="CVE"/>
<reboot_needed/></patchinfo>
openSUSE Build Service is sponsored by