In handle_msg_shm_map_req of trusty/user/base/lib/spi/srv...
Moderate severity
Unreviewed
Published
Jun 13, 2024
to the GitHub Advisory Database
•
Updated Jul 16, 2024
Description
Published by the National Vulnerability Database
Jun 13, 2024
Published to the GitHub Advisory Database
Jun 13, 2024
Last updated
Jul 16, 2024
In handle_msg_shm_map_req of trusty/user/base/lib/spi/srv/tipc/tipc.c, there is a possible stack data disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
References