{ "id": "CVE-2024-32910", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.103", "lastModified": "2024-06-17T12:43:31.090", "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "In handle_msg_shm_map_req of trusty/user/base/lib/spi/srv/tipc/tipc.c, there is a possible stack data disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." }, { "lang": "es", "value": "En handle_msg_shm_map_req de trusty/user/base/lib/spi/srv/tipc/tipc.c, existe una posible divulgaci\u00f3n de datos de la pila debido a datos no inicializados. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", "source": "dsap-vuln-management@google.com" } ] }