描述:
Google 發布了 Android 保安公告 (2026 年 3 月) 以應對 Android 操作系統的多個保安漏洞。有關安全性更新的列表,請參考以下網址:
https://source.android.com/docs/security/bulletin/2026/2026-03-01
Android 指記憶體損毀漏洞 (CVE-2026-21385) 可能受到有限的針對性攻擊。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- Android 14、15、16 及 16-qpr2 版本
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、權限提升或泄漏資訊。
建議:
有些生產商已經或計劃就其 Android 系統提供應對措施。用戶應諮詢產品供應商以確認修補程式的供應狀況。如修補程式已可獲取,用戶應立刻安排更新至相應版本或遵從產品供應商的建議以降低風險。
進一步資訊:
- https://source.android.com/docs/security/bulletin/2026/2026-03-01
- https://www.hkcert.org/tc/security-bulletin/android-multiple-vulnerabilities_20260303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43766
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43859
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10865
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20760 (to CVE-2025-20762)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20793 (to CVE-2025-20795)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32313
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47346
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47348
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47366
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47378
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47385
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47394 (to CVE-2025-47398)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47402
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48544
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48567 (to CVE-2025-48568)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48577 (to CVE-2025-48579)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48582
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48585
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48605
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48613
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48619
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48630 (to CVE-2025-48631)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48634 (to CVE-2025-48635)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48641 (to CVE-2025-48642)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48644 (to CVE-2025-48646)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48650
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48653 (to CVE-2025-48654)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58407 (to CVE-2025-58409)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58411
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59600
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61612 (to CVE-2025-61616)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64783 (to CVE-2025-64784)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64893
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69278 (to CVE-2025-69279)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0005 (to CVE-2026-8)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0010 (to CVE-2026-15)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0020 (to CVE-2026-21)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0023 (to CVE-2026-32)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0034 (to CVE-2026-35)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0037 (to CVE-2026-38)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20425 (to CVE-2026-20428)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20434
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20401 (to CVE-2026-20406)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20420 (to CVE-2026-20422)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21385