In tracepoint_msg_handler of cpm/google/lib/tracepoint/tracepoint_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| Vendors & Products |
Google
Google android |
Thu, 11 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In tracepoint_msg_handler of cpm/google/lib/tracepoint/tracepoint_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google_Devices
Published:
Updated: 2025-12-12T04:55:58.139Z
Reserved: 2025-04-16T00:33:45.253Z
Link: CVE-2025-36932
No data.
Status : Awaiting Analysis
Published: 2025-12-11T20:15:57.810
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-36932
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:41Z
Weaknesses
No weakness.