CVE-2026-6245
Unknown
CVE-2026-6245
SUSE
Released: April 17, 2026
Updated: April 17, 2026
Restart Required
Description
CVE-2026-6245
A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() function within the PAM passkey responder fails to properly handle raw bytes received from a pipe. Because the data is treated as a NUL-terminated C string without explicit termination, it results in an out-of-bounds read when processed by functions like snprintf(). A local attacker could potentially trigger this vulnerability by initiating a crafted passkey authentication request, causing the SSSD PAM responder to crash, resulting in a local Denial of Service (DoS).
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Fixed Vulnerabilities 1
Apr 15, 2026
A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() function within the PAM passkey responder fails to properly handle raw bytes…
Quick Info
Patch ID:
CVE-2026-6245
Vendor:
SUSE
Severity:
Unknown
CVEs Fixed:
1
Restart:
Required
Vendor
SUSEAdditional Info
advisory id:
CVE-2026-6245
advisory type:
Security Update
cvrf filename:
cvrf-CVE-2026-6245.xml
