Tada Images / Shutterstock.com
Google has released its May security patch that fixes 45 security flaws, including an actively exploited zero-click code execution vulnerability. The flaw lies in the FreeType 2 open-source font rendering library and is tracked as CVE-2025-27363 with a CVE score of 8.1.
The May updates are available for Android 13, 14, and 15 devices. Vendors are usually notified at least a month before Google publishes updates. However, this doesn’t mean the patches are available for all devices at the same time as Google’s updates, and often can take a few weeks to roll out.
Facebook security researchers discovered the vulnerability in March 2025, which affects all FreeType versions up to 2.13. The library has issued an update fixing the issue. Google’s patch notes on the issue clearly state that user interaction isn’t required for exploitation and that the bug has come under “limited, targeted exploitation.” Other information about the attack vector or exploitation wasn’t provided either.

Facebook’s bulletin explains that an attacker may exploit how FreeType processes some TrueType GX and variable font files. The issue is caused by the library’s mishandling of values in device memory, creating an out-of-bounds write vulnerability. When a program accesses memory outside its allocated space, it can cause crashes, expose sensitive information, or allow arbitrary code execution.
FreeType is a system library embedded in Android, meaning users can’t check the version installed on their particular devices. The best approach to preventing any cyberattacks exploiting the bug is to update your Android to the latest security patch available as soon as possible. Since Android 12 reached end of support on March 31, 2025, smartphones running Android 12 and older remain vulnerable. Third-party Android distros can help patch the issue.
Other bugs fixed by Google in the update include issues in framework, system, Google Play, and the Android Kernel. Updates for third-party components from MediaTek, Qualcomm, Arm, and Imagination Technologies were also patched.
In the News: Brand new investment scam checks your IP address before scamming