CVE-2026-6245 Unknown

CVE-2026-6245

SUSE Released: April 17, 2026 Updated: April 17, 2026 Restart Required

Description

CVE-2026-6245 A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() function within the PAM passkey responder fails to properly handle raw bytes received from a pipe. Because the data is treated as a NUL-terminated C string without explicit termination, it results in an out-of-bounds read when processed by functions like snprintf(). A local attacker could potentially trigger this vulnerability by initiating a crafted passkey authentication request, causing the SSSD PAM responder to crash, resulting in a local Denial of Service (DoS). The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

Fixed Vulnerabilities 1

CVE-2026-6245 N/A 0.0 ⚠️ KEV fixed
Apr 15, 2026

A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() function within the PAM passkey responder fails to properly handle raw bytes…

Quick Info

Patch ID: CVE-2026-6245
Vendor: SUSE
Severity: Unknown
CVEs Fixed: 1
Restart: Required

Vendor

SUSE

Additional Info

advisory id: CVE-2026-6245
advisory type: Security Update
cvrf filename: cvrf-CVE-2026-6245.xml

Share