Bug 2454957 (CVE-2026-34978) - CVE-2026-34978 cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier
Summary: CVE-2026-34978 cups: OpenPrinting CUPS: Denial of Service via path traversal ...
Keywords:
Status: NEW
Alias: CVE-2026-34978
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2454990
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-03 22:01 UTC by OSIDB Bzimport
Modified: 2026-04-03 23:15 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-03 22:01:51 UTC
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.


Note You need to log in before you can comment on or make changes to this bug.