CVE-2026-0031
Integer Overflow in mem_protect.c Causes Local Privilege Escalation
Publication date: 2026-03-02
Last updated on: 2026-03-06
Assigner: Android (associated with Google Inc. or Open Handset Alliance)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-190 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in multiple functions of the mem_protect.c file where an integer overflow can cause an out of bounds write.
An integer overflow occurs when a calculation exceeds the maximum size that can be stored in an integer variable, leading to unexpected behavior.
The out of bounds write means that the program writes data outside the intended memory area, which can corrupt memory and cause security issues.
How can this vulnerability impact me? :
This vulnerability can lead to local escalation of privilege, meaning an attacker who already has some access to the system could gain higher privileges.
No additional execution privileges or user interaction are needed to exploit this vulnerability, making it easier for an attacker to leverage.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know