Hi Michael,

[looping in the sec-team for completeness]

On Thu, May 05, 2022 at 10:19:38PM +0200, Michael Biebl wrote:
> Am 05.05.22 um 17:10 schrieb Salvatore Bonaccorso:
> > Source: rsyslog
> > Version: 8.2204.0-1
> > Severity: grave
> > Tags: security upstream
> > Justification: user security hole
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > <t...@security.debian.org>
> > 
> > Hi,
> > 
> > The following vulnerability was published for rsyslog. Filling for now
> > as grave, but we might downgrade. Probably affected configurations are
> > not that common if I understood correctly, the advisory has some
> > comments about it as well[1].
> 
> Yeah, I think this feature is obscure enough (and not enabled by default)
> that non-RC severity is fine.

Thinking a bit more on it I see two aspects:

* Usually following recommendations one should not expose recievers to
  public, which makes the risk considerably lower.
* Though still reciervers enable octed-framing by default.

So I think to leave the severity actually as it is, and consider it RC
and at earliest point possible for you either do a cherry-picked
upload on top of 8.2204.0-1 or just upload 8.2204.1 to unstable, I
htink I would prefer the later.

Secondly, about releasing a DSA, still slight borderline, but I think
we would be safer to release one. I can help rpepare updates for
bullseye and buster here if needed and wanted. I the git repository I
see 8.2102.0-2+deb11u1 as released for bullseye but this change
actually never landed to bullseye and was not acked by SRM?

Regards,
Salvatore

Reply via email to