Bug 1212889 (CVE-2023-3297)

Summary: VUL-0: CVE-2023-3297: accountsservice: use-after-free via a D-Bus message to the accounts-daemon process
Product: [Novell Products] SUSE Security Incidents Reporter: Cathy Hu <cathy.hu>
Component: IncidentsAssignee: E-mail List <gnome-bugs>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/370890/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-3297:7.4:(AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Cathy Hu 2023-06-30 08:53:48 UTC
CVE-2023-3297

An unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process.

References:
https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/2024182
https://packetstormsecurity.com/files/173189/USN-6190-1.txt

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3297
https://bugzilla.redhat.com/show_bug.cgi?id=2218566
Comment 1 Cathy Hu 2023-06-30 09:02:04 UTC
As far as I can see this affects patches applied only in ubuntu. 
i quickly grepped through the code and we seem to not have those patches applied, so i will track these as not affected:                                              
- SUSE:ALP:Source:Standard:1.0/accountsservice  22.08.8    
- SUSE:SLE-12-SP2:Update/accountsservice        0.6.42     
- SUSE:SLE-15-SP2:Update/accountsservice        0.6.55     
- SUSE:SLE-15-SP4:Update/accountsservice        0.6.55                  
- SUSE:SLE-15:Update/accountsservice            0.6.45                  
- openSUSE:Factory/accountsservice              23.13.9