note: 8.2204.1 is 8..2204.0 with just the fix cherry-picked. No other changes.
Rainer El sáb, 7 may 2022 a las 14:48, Salvatore Bonaccorso (<car...@debian.org>) escribió: > > Hi Michael, > > [looping in the sec-team for completeness] > > On Thu, May 05, 2022 at 10:19:38PM +0200, Michael Biebl wrote: > > Am 05.05.22 um 17:10 schrieb Salvatore Bonaccorso: > > > Source: rsyslog > > > Version: 8.2204.0-1 > > > Severity: grave > > > Tags: security upstream > > > Justification: user security hole > > > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > > <t...@security.debian.org> > > > > > > Hi, > > > > > > The following vulnerability was published for rsyslog. Filling for now > > > as grave, but we might downgrade. Probably affected configurations are > > > not that common if I understood correctly, the advisory has some > > > comments about it as well[1]. > > > > Yeah, I think this feature is obscure enough (and not enabled by default) > > that non-RC severity is fine. > > Thinking a bit more on it I see two aspects: > > * Usually following recommendations one should not expose recievers to > public, which makes the risk considerably lower. > * Though still reciervers enable octed-framing by default. > > So I think to leave the severity actually as it is, and consider it RC > and at earliest point possible for you either do a cherry-picked > upload on top of 8.2204.0-1 or just upload 8.2204.1 to unstable, I > htink I would prefer the later. > > Secondly, about releasing a DSA, still slight borderline, but I think > we would be safer to release one. I can help rpepare updates for > bullseye and buster here if needed and wanted. I the git repository I > see 8.2102.0-2+deb11u1 as released for bullseye but this change > actually never landed to bullseye and was not acked by SRM? > > Regards, > Salvatore >