Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
嗯,用户让我总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章,抓住关键点。 文章主要讲的是Google披露了一个严重的安全漏洞,影响的是Android设备中使用的高通开源组件。这个漏洞被编号为CVE-2026-21385,CVSS评分7.8,属于缓冲区溢出问题。高通在公告中提到这是一个整数溢出,导致内存腐败。漏洞是在2025年12月18日通过Google的Android安全团队报告的,用户在2026年2月2日被告知。 此外,Google的三月份更新修复了129个漏洞,包括一些关键问题,比如系统组件中的远程代码执行漏洞。同时修复的还有多个严重漏洞,涉及权限提升和拒绝服务攻击等。文章还提到有两个补丁级别,帮助合作伙伴更快修复不同设备上的漏洞。 用户的需求是希望得到一个简洁明了的总结,所以我要提炼出最重要的信息:Google披露了高通组件的安全漏洞,影响Android设备,并且已经有野外利用的迹象。同时提到了修复情况和其他关键漏洞。 最后,确保字数控制在100字以内,并且直接描述内容,不使用开头语。 </think> Google披露高通组件CVE-2026-21385安全漏洞影响Android设备,存在野外利用迹象。该漏洞为缓冲区溢出问题,可能导致内存腐败。Google三月更新修复129个漏洞,并针对其他严重安全问题发布补丁。 2026-3-3 07:8:0 Author: thehackernews.com(查看原文) 阅读量:11 收藏

Vulnerability / Mobile Security

Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild.

The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component.

"Memory corruption when adding user-supplied data without checking available buffer space," Qualcomm said in an advisory, describing it as an integer overflow.

The chipmaker said the flaw was reported to it through Google's Android Security team on December 18, 2025. Customers were notified of the security defect on February 2, 2026.

There are currently no details on how the vulnerability is being exploited in the wild. However, Google acknowledged in its monthly Android security bulletin that "there are indications that CVE-2026-21385 may be under limited, targeted exploitation."

Google's March 2026 update contains patches for a total of 129 vulnerabilities, including a critical flaw in the System component (CVE-2026-0006) that could lead to remote code execution without requiring any additional privileges or user interaction. In contrast, Google addressed one Android vulnerability in January 2026 and none last month.

Also patched by Google are multiple critical-rated bugs: a privilege escalation bug in Framework (CVE-2026-0047), a denial-of-service (DoS) in System (CVE-2025-48631), and seven privilege escalation flaws in Kernel components (CVE-2024-43859, CVE-2026-0037, CVE-2026-0038, CVE-2026-0027, CVE-2026-0028, CVE-2026-0030, and CVE-2026-0031).

The Android security bulletin includes two patch levels – 2026-03-01 and 2026-03-05 – to give Android partners the flexibility to address common vulnerabilities on different devices more quickly.

The second patch level includes fixes for Kernel components, as well as those from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unisoc.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html
如有侵权请联系:admin#unsafe.sh