[From nobody Sun Apr 12 19:07:09 2026
Received: (at submit) by bugs.debian.org; 8 Jan 2026 18:00:55 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-16.7 required=4.0 tests=BAYES_00,
 BODY_INCLUDES_PACKAGE,FROMDEVELOPER,HAS_PACKAGE,MD5_SHA1_SUM,
 RCVD_IN_SBLXBL,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_NONE,
 XMAILER_REPORTBUG autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 12; hammy, 150; neutral, 44; spammy,
 0. spammytokens: hammytokens:0.000-+--H*F:U*biebl,
 0.000-+--H*rp:U*biebl, 0.000-+--H*RU:sk:biebl@d, 0.000-+--HTo:N*Debian,
 0.000-+--H*Ad:N*Bug
Return-path: &lt;biebl@debian.org&gt;
Received: from dd51734.kasserver.com ([85.13.156.41]:57732)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.96) (envelope-from &lt;biebl@debian.org&gt;) id 1vduJY-007BIA-0s
 for submit@bugs.debian.org; Thu, 08 Jan 2026 18:00:55 +0000
Received: from mars.milchstrasse.xx (unknown [94.176.248.183])
 by dd51734.kasserver.com (Postfix) with ESMTPSA id 8D0E9DC02EF9;
 Thu,  8 Jan 2026 17:43:39 +0100 (CET)
Received: by mars.milchstrasse.xx (Postfix, from userid 1000)
 id E9ED0960C46; Thu, 08 Jan 2026 17:43:38 +0100 (CET)
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Michael Biebl &lt;biebl@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: Verify file permissions for private connections (CVE-2025-9615)
Message-ID: &lt;176789061893.27702.10799215436731480538.reportbug@mars&gt;
X-Mailer: reportbug 13.2.0
Date: Thu, 08 Jan 2026 17:43:38 +0100
X-Spamd-Bar: /
Delivered-To: submit@bugs.debian.org

Package: network-manager-ssh
Version: 1.2.11-1.1
Severity: important
User: biebl@debian.org
Usertags: CVE-2025-9615

Hi,

the network-manager package was subject to a security issue related to
insecure access to user certificates. See [0] for more details.

This was fixed in [1] and now all VPN plugins need to declare that they
support the new, safe interface.
See [2] for further details and [3] for a similar change that was done
for network-manager-openvpn.

The network-manager 1.54.x package in unstable/testing has been updated
to provide safe APIs for user certificate file access.
For now the usage of those safe APIs is optional but will become
mandatory in network-manager 1.56.
At which point this bug report will become RC as network-manager will
refuse to load VPN plugins without
&quot;supports-safe-private-file-access=true&quot;.

Regards,
Michael

[0] https://security-tracker.debian.org/tracker/CVE-2025-9615
[1] https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/merge_requests/2324
[2] https://lists.freedesktop.org/archives/networkmanager/2025-December/000468.html
[3] https://gitlab.gnome.org/GNOME/NetworkManager-openvpn/-/commit/ca18fa91e1446543b48a463fb72a4de6a8716aa9
]