A user in group defined by SystemGroup directive in /etc/cups/cups-files.conf can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:0312 https://access.redhat.com/errata/RHSA-2026:0312
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:0464 https://access.redhat.com/errata/RHSA-2026:0464
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:0596 https://access.redhat.com/errata/RHSA-2026:0596