In code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478
Use CWE-909, Google vendor hub and Android product page to widen CVE-2021-0966 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-0124, CVE-2026-0120 and CVE-2026-6920 for nearby disclosures in the same product family.