描述:
Google 发布了 Android 保安公告 (2026 年 3 月) 以应对 Android 操作系统的多个保安漏洞。有关安全性更新的列表,请参考以下网址:
https://source.android.com/docs/security/bulletin/2026/2026-03-01
Android 指记忆体损毁漏洞 (CVE-2026-21385) 可能受到有限的针对性攻击。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- Android 14、15、16 及 16-qpr2 版本
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、权限提升或泄漏资讯。
建议:
有些生产商已经或计划就其 Android 系统提供应对措施。用户应谘询产品供应商以确认修补程式的供应状况。如修补程式已可获取,用户应立刻安排更新至相应版本或遵从产品供应商的建议以降低风险。
进一步资讯:
- https://source.android.com/docs/security/bulletin/2026/2026-03-01
- https://www.hkcert.org/tc/security-bulletin/android-multiple-vulnerabilities_20260303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43766
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43859
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10865
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20760 (to CVE-2025-20762)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20793 (to CVE-2025-20795)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32313
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47346
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47348
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47366
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47378
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47385
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47394 (to CVE-2025-47398)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47402
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48544
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48567 (to CVE-2025-48568)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48577 (to CVE-2025-48579)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48582
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48585
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48605
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48613
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48619
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48630 (to CVE-2025-48631)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48634 (to CVE-2025-48635)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48641 (to CVE-2025-48642)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48644 (to CVE-2025-48646)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48650
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48653 (to CVE-2025-48654)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58407 (to CVE-2025-58409)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58411
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59600
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61612 (to CVE-2025-61616)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64783 (to CVE-2025-64784)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64893
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69278 (to CVE-2025-69279)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0005 (to CVE-2026-8)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0010 (to CVE-2026-15)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0020 (to CVE-2026-21)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0023 (to CVE-2026-32)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0034 (to CVE-2026-35)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0037 (to CVE-2026-38)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20425 (to CVE-2026-20428)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20434
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20401 (to CVE-2026-20406)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20420 (to CVE-2026-20422)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21385