CVE-2025-36919
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-12

Assigner: Google Devices

Description
In aocc_read of aoc_channel_dev.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-12
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
google android *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-415 The product calls free() twice on the same memory address.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a double free issue in the aocc_read function of the aoc_channel_dev.c file caused by improper locking. A double free means that the same memory is freed twice, which can lead to undefined behavior and potential security issues.


How can this vulnerability impact me? :

This vulnerability can lead to local escalation of privilege, allowing an attacker with local access to gain higher privileges without needing additional execution privileges or user interaction.


What immediate steps should I take to mitigate this vulnerability?

Since the vulnerability involves a possible double free leading to local privilege escalation, immediate mitigation steps include applying the latest security patches or firmware updates provided by the vendor once available. No user interaction is needed for exploitation, so ensuring the system is updated to the latest security patch level is critical.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart