Description

A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() function within the PAM passkey responder fails to properly handle raw bytes received from a pipe. Because the data is treated as a NUL-terminated C string without explicit termination, it results in an out-of-bounds read when processed by functions like snprintf(). A local attacker could potentially trigger this vulnerability by initiating a crafted passkey authentication request, causing the SSSD PAM responder to crash, resulting in a local Denial of Service (DoS).

INFO

Published Date :

2026-04-15T18:35:19.401Z

Last Modified :

2026-04-15T20:01:50.488Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-6245 vulnerability.

Vendors Products
Redhat
  • Enterprise Linux
  • Openshift
  • Openshift Container Platform

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact