In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
References
| Link | Resource |
|---|---|
| https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70 | Mailing List Patch |
| https://source.android.com/security/bulletin/2024-01-01 | Patch Vendor Advisory |
| https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70 | Mailing List Patch |
| https://source.android.com/security/bulletin/2024-01-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-16 19:15
Updated : 2025-03-14 18:15
NVD link : CVE-2024-0015
Mitre link : CVE-2024-0015
CVE.ORG link : CVE-2024-0015
JSON object : View
Products Affected
- android
CWE
