Google’s latest Android security update fixes two actively exploited flaws
嗯,用户让我用中文总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,找出关键信息。 文章主要讲的是Google发布了最新的Android安全更新,修复了107个漏洞,其中有2个是已经被积极利用的。这两个漏洞分别是CVE-2025-48572和CVE-2025-48633,分别涉及权限提升和信息泄露。此外,更新还修复了内核和 Qualcomm 组件中的多个高危漏洞。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖修复的漏洞总数、被利用的漏洞数量以及它们的影响。同时,要提到更新涉及的组件,如系统、内核和 Qualcomm 组件。 可能的结构是:Google发布安全更新,修复107个漏洞,其中两个已被利用;涉及系统、内核、 Qualcomm 组件;漏洞可能导致权限提升或信息泄露。 检查一下字数是否符合要求,并确保没有使用“文章内容总结”之类的开头。最后,通读一遍确保信息准确无误。 </think> Google发布最新Android安全更新,修复107个漏洞,其中两个已被积极利用。更新涵盖系统、内核及 Qualcomm 组件,部分漏洞可能导致权限提升或信息泄露。 2025-12-2 10:23:7 Author: securityaffairs.com(查看原文) 阅读量:8 收藏

Google’s latest Android security update fixes two actively exploited flaws

Pierluigi Paganini December 02, 2025

Google’s latest Android security update fixes 107 flaws across multiple components, including two vulnerabilities actively exploited in the wild.

Google’s new Android update patches 107 vulnerabilities, including two already exploited in the wild, across system, kernel, and major vendor components.

Here’s a concise summary under 160 characters:

December’s Android update offers two patch levels (12-01, 12-05) for faster fixes across devices.

The two high-severity vulnerabilities that are “under limited, targeted exploitation” are:

  • CVE-2025-48572 – An elevation of privilege vulnerability in Framework
  • CVE-2025-48633 – An information disclosure vulnerability in Framework

As usual, Google did not provide technical details about the attacks exploiting the above vulnerabilities.

The tech giant also addressed the following critical vulnerabilities in the kernel component:

CVEReferencesTypeSeveritySubcomponent
CVE-2025-48623A-436580278
Upstream kernel [2]
EoPCriticalpKVM
CVE-2025-48624A-443053939
Upstream kernel
EoPCriticalIOMMU
CVE-2025-48637A-443763663
Upstream kernel [2]
EoPCriticalpKVM
CVE-2025-48638A-442540376
Upstream kernel [2]
EoPCriticalpKVM

and Qualcomm closed-source components:

CVEReferencesSeveritySubcomponent
CVE-2025-47319A-421905250*CriticalClosed-source component
CVE-2025-47372A-442619421*CriticalClosed-source component

“The most severe of these issues is a critical security vulnerability in the Framework component that could lead to remote denial of service with no additional execution privileges needed.” reads the advisory published by Google. “The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Google)




文章来源: https://securityaffairs.com/185226/security/googles-latest-android-security-update-fixes-two-actively-exploited-flaws.html
如有侵权请联系:admin#unsafe.sh