You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In setOptions of ActivityRecord.java, there is a possible load any arbitrary Java code into launcher process due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-237290578
CVE-2022-20419 - High Severity Vulnerability
Vulnerable Library - androidandroid-4.2.2_r1.2
Library home page: https://github.com/cn00/android.git
Found in HEAD commit: 8f34e6b923df3b4968e0a767f6dec326066356db
Found in base branch: master
Vulnerable Source Files (3)
/core/java/android/app/ActivityOptions.java
/core/java/android/app/ActivityOptions.java
/core/java/android/app/ActivityOptions.java
Vulnerability Details
In setOptions of ActivityRecord.java, there is a possible load any arbitrary Java code into launcher process due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-237290578
Publish Date: 2022-10-11
URL: CVE-2022-20419
CVSS 3 Score Details (7.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://android.googlesource.com/platform/frameworks/base/+/e5dd8be748c76c11615050c610dfc1fae73ad4a4
Release Date: 2022-10-11
Fix Resolution: android-13.0.0_r7
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: