SB2026030302 - Multiple vulnerabilities in Google Android
Published: March 3, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 82 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2025-47388)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
2) Out-of-bounds write (CVE-ID: CVE-2026-20404)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in modem subcomponent. A local application can execute arbitrary code.
3) Reachable Assertion (CVE-ID: CVE-2026-20405)
The vulnerability allows a local application to perform a denial of service attack.
The vulnerability exists due to a missing bounds check in modem subcomponent. A local application can crash the system.
4) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2026-20406)
The vulnerability allows a local application to perform a denial of service attack.
The vulnerability exists due to an uncaught exception in modem subcomponent. A local application can crash the system.
5) Out-of-bounds read (CVE-ID: CVE-2026-20420)
The vulnerability allows a local application to perform a denial of service attack.
The vulnerability exists due to incorrect error handling in modem subcomponent. A local application can perform a denial of service attack.
6) Out-of-bounds read (CVE-ID: CVE-2026-20421)
The vulnerability allows a local application to perform a denial of service attack.
The vulnerability exists due to improper input validation in modem subcomponent. A local application can crash the system.
7) Reachable Assertion (CVE-ID: CVE-2026-20422)
The vulnerability allows a local application to perform a denial of service attack.
The vulnerability exists due to improper input validation in modem subcomponent. A local application can crash the system.
8) Buffer overflow (CVE-ID: CVE-2025-47394)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
9) Out-of-bounds write (CVE-ID: CVE-2026-20402)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in modem subcomponent. A local application can execute arbitrary code.
10) Double Free (CVE-ID: CVE-2025-47396)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.
11) Missing release of memory after effective lifetime (CVE-ID: CVE-2025-47397)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.
12) Use After Free (CVE-ID: CVE-2025-47398)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.
13) Buffer over-read (CVE-ID: CVE-2025-59600)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.
14) Integer overflow (CVE-ID: CVE-2026-21385)
The vulnerability allows a malicious application to escalate privileges on the system.
The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.
15) Use After Free (CVE-ID: CVE-2025-47339)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.
16) Out-of-bounds write (CVE-ID: CVE-2025-47346)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.
17) Use of Uninitialized Variable (CVE-ID: CVE-2025-47348)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.
18) Exposed Dangerous Method or Function (CVE-ID: CVE-2025-47366)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.
19) Exposure of Sensitive System Information to an Unauthorized Control Sphere (CVE-ID: CVE-2025-47378)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.
20) Improper Access Control for Register Interface (CVE-ID: CVE-2025-47385)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in SCE-Mink. A local application can execute arbitrary code.
21) Buffer over-read (CVE-ID: CVE-2025-47395)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
22) Buffer over-read (CVE-ID: CVE-2025-47402)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
23) Out-of-bounds write (CVE-ID: CVE-2026-20403)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a missing bounds check in modem subcomponent. A local application can execute arbitrary code.
24) Reachable Assertion (CVE-ID: CVE-2026-20401)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an uncaught exception in modem subcomponent. A local application can execute arbitrary code.
25) NULL pointer dereference (CVE-ID: CVE-2024-43859)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the f2fs_set_inode_flags() function in fs/f2fs/inode.c, within the f2fs_file_mmap() and f2fs_file_open() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.
26) Out-of-bounds read (CVE-ID: CVE-2025-38616)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tls_rx_rec_wait() function in net/tls/tls_sw.c, within the tls_strp_load_anchor_with_queue() and tls_strp_msg_load() functions in net/tls/tls_strp.c. A local user can perform a denial of service (DoS) attack.
27) Use-after-free (CVE-ID: CVE-2025-38618)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __vsock_bind_connectible() function in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.
28) Memory leak (CVE-ID: CVE-2025-39682)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the decrypt_skb() and tls_sw_recvmsg() functions in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.
29) Out-of-bounds read (CVE-ID: CVE-2025-39946)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tls_rx_msg_size() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.
30) Out-of-bounds read (CVE-ID: CVE-2025-40266)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __do_ffa_mem_xfer() function in arch/arm64/kvm/hyp/nvhe/ffa.c. A local user can perform a denial of service (DoS) attack.
31) Stack-based buffer overflow (CVE-ID: CVE-2025-20794)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within Modem. A local application can execute arbitrary code.
32) NULL Pointer Dereference (CVE-ID: CVE-2025-20793)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to incorrect error handling within Modem. A local application can execute arbitrary code.
33) Reachable Assertion (CVE-ID: CVE-2025-20762)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to incorrect error handling within Modem. A local application can execute arbitrary code.
34) Improper Check for Unusual or Exceptional Conditions (CVE-ID: CVE-2025-20761)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to incorrect error handling within Modem. A local application can execute arbitrary code.
35) Reachable Assertion (CVE-ID: CVE-2025-20760)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an uncaught exception within Modem. A local application can execute arbitrary code.
36) Out-of-bounds write (CVE-ID: CVE-2025-20795)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within KeyInstall. A local application can execute arbitrary code.
37) Improper input validation (CVE-ID: CVE-2025-48609)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
38) Improper input validation (CVE-ID: CVE-2025-48587)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
39) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0024)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
40) Improper input validation (CVE-ID: CVE-2025-48653)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
41) Improper input validation (CVE-ID: CVE-2026-0017)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
42) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2024-43766)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
43) Improper input validation (CVE-ID: CVE-2025-48602)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
44) Improper input validation (CVE-ID: CVE-2026-0015)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
45) Improper input validation (CVE-ID: CVE-2026-0006)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
46) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48642)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
47) Improper input validation (CVE-ID: CVE-2025-48644)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
48) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0025)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
49) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0012)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
50) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48630)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
51) Improper input validation (CVE-ID: CVE-2025-48585)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
52) Improper input validation (CVE-ID: CVE-2025-48650)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
53) Improper input validation (CVE-ID: CVE-2026-0014)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
54) Improper input validation (CVE-ID: CVE-2026-0021)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
55) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0005)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
56) Improper input validation (CVE-ID: CVE-2025-48641)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
57) Improper input validation (CVE-ID: CVE-2026-0035)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
58) Improper input validation (CVE-ID: CVE-2026-0023)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
59) Improper input validation (CVE-ID: CVE-2026-0013)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
60) Improper input validation (CVE-ID: CVE-2025-48654)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
61) Improper input validation (CVE-ID: CVE-2025-48646)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
62) Improper input validation (CVE-ID: CVE-2025-48645)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
63) Improper input validation (CVE-ID: CVE-2025-48635)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
64) Improper input validation (CVE-ID: CVE-2025-48634)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
65) Improper input validation (CVE-ID: CVE-2026-0026)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
66) Improper input validation (CVE-ID: CVE-2025-48605)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
67) Improper input validation (CVE-ID: CVE-2025-48582)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
68) Improper input validation (CVE-ID: CVE-2025-48579)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
69) Improper input validation (CVE-ID: CVE-2025-48578)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
70) Improper input validation (CVE-ID: CVE-2025-48577)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
71) Improper input validation (CVE-ID: CVE-2026-0034)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
72) Improper input validation (CVE-ID: CVE-2025-48619)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
73) Improper input validation (CVE-ID: CVE-2026-0020)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
74) Improper input validation (CVE-ID: CVE-2026-0007)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
75) Improper input validation (CVE-ID: CVE-2026-0011)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
76) Improper input validation (CVE-ID: CVE-2026-0010)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
77) Improper input validation (CVE-ID: CVE-2026-0008)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
78) Improper input validation (CVE-ID: CVE-2025-48574)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
79) Improper input validation (CVE-ID: CVE-2025-48567)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
80) Improper input validation (CVE-ID: CVE-2026-0047)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
81) Improper input validation (CVE-ID: CVE-2025-48568)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
82) Improper input validation (CVE-ID: CVE-2025-32313)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
Remediation
Install update from vendor's website.