Platform Packages Services Car vulnerabilities
4 known vulnerabilities affecting platform/packages_services_car.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
UNKNOWN4
Vulnerabilities
Page 1 of 1
CVE-2022-20350UNKNOWN≥ 10:0, < 10:2022-08-01≥ 11:0, < 11:2022-08-012022-08-01
CVE-2022-20350 CVE-2022-20350: In onCreate of NotificationAccessConfirmationActivity
In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way to trick the victim to grant notification access to the wrong app due to improper input validation. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2021-0303UNKNOWN≥ 11:0, < 11:2021-01-012021-01-01
CVE-2021-0303 CVE-2021-0303: In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver
In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2020-0459UNKNOWN≥ 8.0:0, < 8.0:2020-12-01≥ 8.1:0, < 8.1:2020-12-01+2 more2020-12-01
CVE-2020-0459 CVE-2020-0459: In sendConfiguredNetworkChangedBroadcast of WifiConfigManager
In sendConfiguredNetworkChangedBroadcast of WifiConfigManager.java, there is a possible leak of sensitive WiFi configuration data due to a missing permission check. This could lead to local information disclosure of WiFi network names with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2020-0108UNKNOWN≥ 8.1:0, < 8.1:2020-08-01≥ 9:0, < 9:2020-08-01+1 more2020-08-01
CVE-2020-0108 CVE-2020-0108: In postNotification of ServiceRecord
In postNotification of ServiceRecord.java, there is a possible bypass of foreground process restrictions due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
osv