A critical set of unauthenticated Remote Code Execution (RCE) vulnerabilities in CUPS, affecting all GNU/Linux systems and potentially others, was disclosed today. These vulnerabilities allow a remote…
Compared to the original claim that it was kernel level and spread across literally everything?
No, no its not as bad as it was originally claimed.
Is it bad? Yes. Is it kernel level bad? No. It can easily be mitigated before a fix is out by blocking 631 and dns-sd traffic. It is not as bad as it was claimed to be.
Yes.
Its nowhere near the risk that was claimed.
Basically an unauthenticated perl interpreter with root open to the network by default in most configurations across a couple decades.
It’s about as bad as it can be?
Compared to the original claim that it was kernel level and spread across literally everything?
No, no its not as bad as it was originally claimed.
Is it bad? Yes. Is it kernel level bad? No. It can easily be mitigated before a fix is out by blocking 631 and dns-sd traffic. It is not as bad as it was claimed to be.
Is it common for cups to run as root? It should have its own user, but that is still not good.