Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Gemini 2.5 Pro and Flash GA, GitHub Copilot Spaces, and more (June 20, 2025)

      June 20, 2025

      Gemini 2.5 Pro and Flash are generally available and Gemini 2.5 Flash-Lite preview is announced

      June 19, 2025

      CSS Cascade Layers Vs. BEM Vs. Utility Classes: Specificity Control

      June 19, 2025

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025

      Here’s how I fixed a dead Steam Deck screen — with Valve proving they still have the best customer service in gaming

      June 22, 2025

      Borderlands 4 drops stunning new story trailer

      June 22, 2025

      DistroWatch Weekly, Issue 1127

      June 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Exploring Lakebase: Databricks’ Next-Gen AI-Native OLTP Database

      June 22, 2025
      Recent

      Exploring Lakebase: Databricks’ Next-Gen AI-Native OLTP Database

      June 22, 2025

      Understanding JavaScript Promise

      June 22, 2025

      Lakeflow: Revolutionizing SCD2 Pipelines with Change Data Capture (CDC)

      June 21, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025
      Recent

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025

      Here’s how I fixed a dead Steam Deck screen — with Valve proving they still have the best customer service in gaming

      June 22, 2025

      Borderlands 4 drops stunning new story trailer

      June 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Google Rolls Out May 2025 Android Security Bulletin, Fixes 46 Vulnerabilities Including CVE-2025-27363

    Google Rolls Out May 2025 Android Security Bulletin, Fixes 46 Vulnerabilities Including CVE-2025-27363

    May 7, 2025

    Android Security Bulletin

    Google has published its Android Security Bulletin for May 2025, delivering critical updates to the Android ecosystem. This monthly update resolves 46 vulnerabilities, one of which—CVE-2025-27363—has already been exploited in the wild. 

    CVE-2025-27363, a high-severity vulnerability with a CVSS score of 8.1, lies at the core of Google’s May 2025 Android Security Bulletin. Located in the Android System component, this flaw enables local code execution without requiring elevated privileges or user interaction, posing a serious risk to device integrity, particularly if platform and service mitigations are bypassed.  

    The vulnerability, which stems from the widely used FreeType open-source font rendering library, was first identified by Facebook researchers in March 2025 and has since been observed in limited, targeted exploitation.  

    Google described it as the most critical issue addressed in this update, stating, “The most severe of these issues is a high security vulnerability in the System component that could lead to local code execution with no additional execution privileges needed,” in its advisory released on May 5, 2025. 

    Key Details from the May 2025 Android Security Bulletin 

    The May bulletin breaks down the vulnerabilities into two patch levels: 

    • 2025-05-01 Security Patch Level 
    • 2025-05-05 Security Patch Level 

    Devices that receive the 2025-05-05 update will also be protected from all previously disclosed issues. 

    Highlights from the bulletin include 

    • 46 vulnerabilities addressed across core components like System, Framework, Kernel, and third-party hardware drivers. 
    • Android partners were informed at least a month in advance of the bulletin’s publication. 
    • Source code patches will be released into the Android Open Source Project (AOSP) within 48 hours of publication. 

    Other High-Severity Vulnerabilities Patched 

    Apart from CVE-2025-27363, several other critical issues have been resolved. These include: 

    Framework Vulnerabilities (Examples) 

    • CVE-2025-0087 — Elevation of Privilege (EoP) affecting Android versions 13, 14, and 15.
    • CVE-2025-26426 — EoP issue impacting Android 13, 14, and 15.

    System Component Vulnerabilities

    • CVE-2025-26420, CVE-2025-26421 — High-severity EoP bugs patched in multiple versions.
    • CVE-2025-26430 — Local EoP affecting Android 15.

    Google Play System Updates 

    Fixes for issues in: 

    • Documents UI 
    • Permission Controller 
    • WiFi subsystem 

    Third-Party Component Vulnerabilities 

    The bulletin also lists vulnerabilities tied to hardware vendors and chipset manufacturers. These include: 

    Arm (Mali GPU Drivers) 

    • CVE-2025-0072 
    • CVE-2025-0427 

    Imagination Technologies (PowerVR GPU) 

    • Multiple CVEs including CVE-2024-49739 and CVE-2024-47891 

    MediaTek 

    • CVE-2025-20666 — High-severity issue in MediaTek modem components 

    Qualcomm 

    Multiple issues including: 

    • CVE-2025-21467 and CVE-2025-21468 — High-risk flaws affecting camera and location services 
    • Vulnerabilities in closed-source Qualcomm components 

    Google Play Protect and Platform-Level Defenses 

    Google emphasizes the importance of Google Play Protect, which is: 

    • Enabled by default on devices with Google Mobile Services 
    • Designed to detect and warn users about Potentially Harmful Applications (PHAs) 
    • A vital layer of defense, especially for users installing apps from outside the Play Store 

    In addition, Google notes that newer Android versions include enhanced mitigations that make exploitation harder. 

    How to Check Your Security Patch Level 

    Users can check and update their Android version to ensure they have the latest protection. Devices with the following patch strings are considered secure: 

    • [ro.build.version.security_patch]:[2025-05-01] 
    • [ro.build.version.security_patch]:[2025-05-05] 

    Google encourages device manufacturers to bundle all fixes in a single OTA update for streamlined user security. 

    Conclusion  

    CVE-2025-27363 remains the only vulnerability in the May 2025 Android Security Bulletin confirmed to be actively exploited, highlighting the urgency for users to apply updates without delay, particularly those using Android 10 or later. Google has announced that corresponding patches will be made available in the Android Open Source Project (AOSP) within 48 hours. 

    Users are strongly encouraged to check their device’s security patch level and install the latest updates as soon as they become available. Full technical details, patch information, and related resources can be found in the official Android Security Bulletin—May 2025 on the Android developer portal. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleTeleMessage, the Signal clone used by US government officials, suffers hack
    Next Article A Breach, an Apology, and a Pledge to Change: SK Chairman Breaks Silence on Telecom Cyberattack

    Related Posts

    Security

    Canadese overheid meldt aanval op telecombedrijf via bekend Cisco-lek

    June 23, 2025
    Security

    CoinMarketCap Hacked: “Doodle” Graphic Delivers Malware, Stealing $43K+ from User Wallets

    June 23, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The long-awaited second trailer for Grand Theft Auto VI is out NOW — Rockstar Games surprises us all with new GTA6 footage

    News & Updates

    Distribution Release: Commodore OS Vision 3.0

    News & Updates

    CVE-2024-12863 – OpenText Content Management CE Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

    Development

    Highlights

    CVE-2025-5651 – “Traffic Offense Reporting System Cross-Site Scripting Vulnerability”

    June 5, 2025

    CVE ID : CVE-2025-5651

    Published : June 5, 2025, 10:15 a.m. | 1 hour, 25 minutes ago

    Description : A vulnerability, which was classified as problematic, has been found in code-projects Traffic Offense Reporting System 1.0. This issue affects some unknown processing of the file saveuser.php. The manipulation of the argument user_id/username/email/name/position leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

    Severity: 3.5 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4472 – Code-projects Departmental Store Management System Buffer Overflow Vulnerability

    May 9, 2025

    CVE-2024-51552 – ASPECT Password Weakness

    May 22, 2025

    Celebrating GAAD by Committing to Universal Design: Low Physical Effort

    May 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.