RAG Security and Privacy: Formalizing the Threat Model and Attack Surface