The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file. References: https://github.com/Yellow-Pay/CVE/blob/master/CVE-2018-20509.md https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03902.html
Statement: Not vulnerable. The issue is in Android only functionality.