Hi Michael, [looping in the sec-team for completeness]
On Thu, May 05, 2022 at 10:19:38PM +0200, Michael Biebl wrote: > Am 05.05.22 um 17:10 schrieb Salvatore Bonaccorso: > > Source: rsyslog > > Version: 8.2204.0-1 > > Severity: grave > > Tags: security upstream > > Justification: user security hole > > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > <t...@security.debian.org> > > > > Hi, > > > > The following vulnerability was published for rsyslog. Filling for now > > as grave, but we might downgrade. Probably affected configurations are > > not that common if I understood correctly, the advisory has some > > comments about it as well[1]. > > Yeah, I think this feature is obscure enough (and not enabled by default) > that non-RC severity is fine. Thinking a bit more on it I see two aspects: * Usually following recommendations one should not expose recievers to public, which makes the risk considerably lower. * Though still reciervers enable octed-framing by default. So I think to leave the severity actually as it is, and consider it RC and at earliest point possible for you either do a cherry-picked upload on top of 8.2204.0-1 or just upload 8.2204.1 to unstable, I htink I would prefer the later. Secondly, about releasing a DSA, still slight borderline, but I think we would be safer to release one. I can help rpepare updates for bullseye and buster here if needed and wanted. I the git repository I see 8.2102.0-2+deb11u1 as released for bullseye but this change actually never landed to bullseye and was not acked by SRM? Regards, Salvatore