Root tool Magisk may not be as powerful as it was before the death of Magisk hide. But as long as you don’t need to hide root for some apps that require unrooted status, it is always better to have control of the device you own. Magisk tool has received a significant update with Magisk v25.0, which is framed with a full rewrite of how the application counter itself during the boot process.
The primary (probably the first) update is the rewritten MagiskInit
software. If you are unaware of magiskinit
, it is the binary responsible for replacing the stock init process as the first program to run, injecting Magisk services into init.rc, and patching SELinux policy rules. The developer has successfully resolved SELinux-related incompatibilities with a brand new sepolicy
injection mechanism. Moreover, MagiskInit now supports Android 13’s GKI (Generic Kernel Image) format.
Another significant change in the new build is the improved way Magisk grants root permission. The superuser security enhancement brings some security improvements to MagiskSU components. Root permission management has been overhauled to prevent malignant UID reuse attacks. Magisk now imposes root manager APK signature verification to protect you from tampered modified versions of Magisk Manager.
Nevertheless, the developer can use their signing key when building the Magisk from the codebase. Additionally, you can also go for the official debug builds if you need to strip signature verification for tinkering.
Magisk 25.0 Changelog
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new sepolicy injection mechanism
- [MagiskInit] Support Oculus Go
- [MagiskInit] Support Android 13 GKIs (Pixel 6)
- [MagiskBoot] Fix vbmeta extraction implementation
- [App] Fix stub app on older Android versions
- [App] [MagiskSU] Properly support apps using sharedUserId
- [MagiskSU] Fix a possible crash in magiskd
- [MagiskSU] Prune unused UIDs as soon as system_server restarts to prevent UID reuse attacks
- [MagiskSU] Verify and enforce the installed Magisk app’s certificate to match the distributor’s signature
- [MagiskSU] [Zygisk] Proper package management and detection
- [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [Zygisk] Fix Zygisk’s self code unloading implementation
- [DenyList] Fix DenyList on shared UID apps
- [BusyBox] Add workaround for devices running old kernels
Download Magisk 25.0
You can download Magisk 25.0 from the link below. If you need to learn how to install Magisk on your Android device, you can follow our guide using the Magisk tool. If you run into any problem, you can directly report it to the developer using this GitHub repository.
- See also: Google apps Open Source alternative – FOSSAPPS Magisk Module