You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In multiple functions of PackageInstallerService.java and related files, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-230492955
CVE-2023-21081 - High Severity Vulnerability
Vulnerable Library - androidandroid-4.2.2_r1.2
Library home page: https://github.com/cn00/android.git
Found in HEAD commit: 8f34e6b923df3b4968e0a767f6dec326066356db
Found in base branch: master
Vulnerable Source Files (2)
/core/java/android/content/IntentSender.java
/core/java/android/content/IntentSender.java
Vulnerability Details
In multiple functions of PackageInstallerService.java and related files, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-230492955
Publish Date: 2023-04-19
URL: CVE-2023-21081
CVSS 3 Score Details (7.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c
Release Date: 2023-04-19
Fix Resolution: android-13.0.0_r38
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: