1 /* 2 * Copyright (C) 2022 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package android.security.cts; 18 19 import static org.junit.Assume.assumeNoException; 20 21 import android.platform.test.annotations.AsbSecurityTest; 22 23 import com.android.sts.common.tradefed.testtype.NonRootSecurityTestCase; 24 import com.android.tradefed.device.ITestDevice; 25 import com.android.tradefed.testtype.DeviceJUnit4ClassRunner; 26 27 import org.junit.Test; 28 import org.junit.runner.RunWith; 29 30 @RunWith(DeviceJUnit4ClassRunner.class) 31 public class CVE_2022_20475 extends NonRootSecurityTestCase { 32 33 /** 34 * b/240663194 35 * Vulnerable module : services.jar 36 * Is Play Managed : No 37 */ 38 @AsbSecurityTest(cveBugId = 240663194) 39 @Test testPocCVE_2022_20475()40 public void testPocCVE_2022_20475() { 41 try { 42 final String testPkg = "android.security.cts.CVE_2022_20475_test"; 43 ITestDevice device = getDevice(); 44 45 // Install the test and target apps 46 installPackage("CVE-2022-20475-test.apk"); 47 installPackage("CVE-2022-20475-target.apk"); 48 49 // Wake up the device 50 AdbUtils.runCommandLine("input keyevent KEYCODE_WAKEUP", device); 51 AdbUtils.runCommandLine("input keyevent KEYCODE_MENU", device); 52 AdbUtils.runCommandLine("input keyevent KEYCODE_HOME", device); 53 54 // Run the test "testCVE_2022_20475" 55 runDeviceTests(testPkg, testPkg + ".DeviceTest", "testCVE_2022_20475"); 56 } catch (Exception e) { 57 assumeNoException(e); 58 } 59 } 60 } 61