In tracepoint_msg_handler of cpm/google/lib/tracepoint/tracepoint_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
| Link | Resource |
|---|---|
| https://source.android.com/security/bulletin/pixel/2025-12-01 | Vendor Advisory |
Configurations
History
05 Jan 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-20 |
15 Dec 2025, 18:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
| References | () https://source.android.com/security/bulletin/pixel/2025-12-01 - Vendor Advisory | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Google android
|
11 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 20:15
Updated : 2026-01-05 21:16
NVD link : CVE-2025-36932
Mitre link : CVE-2025-36932
CVE.ORG link : CVE-2025-36932
JSON object : View
Products Affected
- android
CWE
