SB2026030302 - Multiple vulnerabilities in Google Android



SB2026030302 - Multiple vulnerabilities in Google Android

Published: March 3, 2026

Security Bulletin ID SB2026030302
Severity
High
Patch available
YES
Number of vulnerabilities 82
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 2% Medium 2% Low 95%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 82 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2025-47388)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.


2) Out-of-bounds write (CVE-ID: CVE-2026-20404)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in modem subcomponent. A local application can execute arbitrary code.


3) Reachable Assertion (CVE-ID: CVE-2026-20405)

The vulnerability allows a local application to perform a denial of service attack.

The vulnerability exists due to a missing bounds check in modem subcomponent. A local application can crash the system.


4) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2026-20406)

The vulnerability allows a local application to perform a denial of service attack.

The vulnerability exists due to an uncaught exception in modem subcomponent. A local application can crash the system.


5) Out-of-bounds read (CVE-ID: CVE-2026-20420)

The vulnerability allows a local application to perform a denial of service attack.

The vulnerability exists due to incorrect error handling in modem subcomponent. A local application can perform a denial of service attack. 


6) Out-of-bounds read (CVE-ID: CVE-2026-20421)

The vulnerability allows a local application to perform a denial of service attack.

The vulnerability exists due to improper input validation in modem subcomponent. A local application can crash the system.


7) Reachable Assertion (CVE-ID: CVE-2026-20422)

The vulnerability allows a local application to perform a denial of service attack.

The vulnerability exists due to improper input validation in modem subcomponent. A local application can crash the system.


8) Buffer overflow (CVE-ID: CVE-2025-47394)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.


9) Out-of-bounds write (CVE-ID: CVE-2026-20402)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in modem subcomponent. A local application can execute arbitrary code.


10) Double Free (CVE-ID: CVE-2025-47396)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.


11) Missing release of memory after effective lifetime (CVE-ID: CVE-2025-47397)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.


12) Use After Free (CVE-ID: CVE-2025-47398)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.


13) Buffer over-read (CVE-ID: CVE-2025-59600)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code.


14) Integer overflow (CVE-ID: CVE-2026-21385)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improper input validation in Graphics. A local application can execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


15) Use After Free (CVE-ID: CVE-2025-47339)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


16) Out-of-bounds write (CVE-ID: CVE-2025-47346)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


17) Use of Uninitialized Variable (CVE-ID: CVE-2025-47348)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


18) Exposed Dangerous Method or Function (CVE-ID: CVE-2025-47366)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.


19) Exposure of Sensitive System Information to an Unauthorized Control Sphere (CVE-ID: CVE-2025-47378)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.


20) Improper Access Control for Register Interface (CVE-ID: CVE-2025-47385)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in SCE-Mink. A local application can execute arbitrary code.


21) Buffer over-read (CVE-ID: CVE-2025-47395)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


22) Buffer over-read (CVE-ID: CVE-2025-47402)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


23) Out-of-bounds write (CVE-ID: CVE-2026-20403)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check in modem subcomponent. A local application can execute arbitrary code.


24) Reachable Assertion (CVE-ID: CVE-2026-20401)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to an uncaught exception in modem subcomponent. A local application can execute arbitrary code.


25) NULL pointer dereference (CVE-ID: CVE-2024-43859)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the f2fs_set_inode_flags() function in fs/f2fs/inode.c, within the f2fs_file_mmap() and f2fs_file_open() functions in fs/f2fs/file.c. A local user can perform a denial of service (DoS) attack.


26) Out-of-bounds read (CVE-ID: CVE-2025-38616)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the tls_rx_rec_wait() function in net/tls/tls_sw.c, within the tls_strp_load_anchor_with_queue() and tls_strp_msg_load() functions in net/tls/tls_strp.c. A local user can perform a denial of service (DoS) attack.


27) Use-after-free (CVE-ID: CVE-2025-38618)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __vsock_bind_connectible() function in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.


28) Memory leak (CVE-ID: CVE-2025-39682)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the decrypt_skb() and tls_sw_recvmsg() functions in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.


29) Out-of-bounds read (CVE-ID: CVE-2025-39946)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the tls_rx_msg_size() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.


30) Out-of-bounds read (CVE-ID: CVE-2025-40266)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __do_ffa_mem_xfer() function in arch/arm64/kvm/hyp/nvhe/ffa.c. A local user can perform a denial of service (DoS) attack.


31) Stack-based buffer overflow (CVE-ID: CVE-2025-20794)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within Modem. A local application can execute arbitrary code.


32) NULL Pointer Dereference (CVE-ID: CVE-2025-20793)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to incorrect error handling within Modem. A local application can execute arbitrary code.


33) Reachable Assertion (CVE-ID: CVE-2025-20762)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to incorrect error handling within Modem. A local application can execute arbitrary code.


34) Improper Check for Unusual or Exceptional Conditions (CVE-ID: CVE-2025-20761)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to incorrect error handling within Modem. A local application can execute arbitrary code.


35) Reachable Assertion (CVE-ID: CVE-2025-20760)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to an uncaught exception within Modem. A local application can execute arbitrary code.


36) Out-of-bounds write (CVE-ID: CVE-2025-20795)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within KeyInstall. A local application can execute arbitrary code.


37) Improper input validation (CVE-ID: CVE-2025-48609)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


38) Improper input validation (CVE-ID: CVE-2025-48587)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


39) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0024)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


40) Improper input validation (CVE-ID: CVE-2025-48653)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


41) Improper input validation (CVE-ID: CVE-2026-0017)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


42) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2024-43766)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


43) Improper input validation (CVE-ID: CVE-2025-48602)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


44) Improper input validation (CVE-ID: CVE-2026-0015)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


45) Improper input validation (CVE-ID: CVE-2026-0006)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


46) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48642)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


47) Improper input validation (CVE-ID: CVE-2025-48644)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


48) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0025)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


49) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0012)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


50) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48630)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


51) Improper input validation (CVE-ID: CVE-2025-48585)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


52) Improper input validation (CVE-ID: CVE-2025-48650)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


53) Improper input validation (CVE-ID: CVE-2026-0014)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


54) Improper input validation (CVE-ID: CVE-2026-0021)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


55) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0005)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


56) Improper input validation (CVE-ID: CVE-2025-48641)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


57) Improper input validation (CVE-ID: CVE-2026-0035)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


58) Improper input validation (CVE-ID: CVE-2026-0023)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


59) Improper input validation (CVE-ID: CVE-2026-0013)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


60) Improper input validation (CVE-ID: CVE-2025-48654)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


61) Improper input validation (CVE-ID: CVE-2025-48646)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


62) Improper input validation (CVE-ID: CVE-2025-48645)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


63) Improper input validation (CVE-ID: CVE-2025-48635)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


64) Improper input validation (CVE-ID: CVE-2025-48634)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


65) Improper input validation (CVE-ID: CVE-2026-0026)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


66) Improper input validation (CVE-ID: CVE-2025-48605)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


67) Improper input validation (CVE-ID: CVE-2025-48582)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


68) Improper input validation (CVE-ID: CVE-2025-48579)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


69) Improper input validation (CVE-ID: CVE-2025-48578)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


70) Improper input validation (CVE-ID: CVE-2025-48577)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


71) Improper input validation (CVE-ID: CVE-2026-0034)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


72) Improper input validation (CVE-ID: CVE-2025-48619)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


73) Improper input validation (CVE-ID: CVE-2026-0020)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


74) Improper input validation (CVE-ID: CVE-2026-0007)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


75) Improper input validation (CVE-ID: CVE-2026-0011)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


76) Improper input validation (CVE-ID: CVE-2026-0010)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


77) Improper input validation (CVE-ID: CVE-2026-0008)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


78) Improper input validation (CVE-ID: CVE-2025-48574)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


79) Improper input validation (CVE-ID: CVE-2025-48567)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


80) Improper input validation (CVE-ID: CVE-2026-0047)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


81) Improper input validation (CVE-ID: CVE-2025-48568)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


82) Improper input validation (CVE-ID: CVE-2025-32313)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


Remediation

Install update from vendor's website.