In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This could lead to local escalation of privilege in a privileged app with no additional execution privileges needed. User interaction is needed for exploitation.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2018-09-01 | patch vendor advisory |