[Android-tools-devel] Bug#1009626: android-platform-frameworks-base: CVE-2021-39796 - possible to trick victim to install harmful app due to a tapjacking/overlay attack

Neil Williams codehelp at debian.org
Wed Apr 13 09:11:56 BST 2022


Source: android-platform-frameworks-base
Version: 1:10.0.0+r36-3
Severity: important
Tags: security
X-Debbugs-Cc: codehelp at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for android-platform-frameworks-base.

CVE-2021-39796[0]:
| In HarmfulAppWarningActivity of HarmfulAppWarningActivity.java, there
| is a possible way to trick victim to install harmful app due to a
| tapjacking/overlay attack. This could lead to local escalation of
| privilege with User execution privileges needed. User interaction is
| needed for exploitation.Product: AndroidVersions: Android-10
| Android-11 Android-12 Android-12LAndroid ID: A-205595291


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-39796
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39796

Please adjust the affected versions in the BTS as needed.


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.16.0-6-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



More information about the Android-tools-devel mailing list