In handle_msg_shm_map_req of trusty/user/base/lib/spi/srv/tipc/tipc.c, there is a possible stack data disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[
{
"vendor": "Google",
"product": "Android",
"versions": [
{
"version": "Android kernel",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]