Nokia 1.3 Android 11 Go Edition update24. 07. 2021 Saturday / By: Robert Denes / Software / Exact time: BST / Print this page
N okia Mobile made an update to Android 11 (Go Edition) available for Nokia 1.3 low-end smartphones today. The first wave will only bring the upgrade to 1 market - Australia. The announcement was made on Nokia phone community forums. The remaining markets will need to receive the update in the coming weeks, however, there is currently no clear announcement about this and the size of the file.
List of markets:
Nokia 1.3 security update size:
I do not currently have information on the size of the Nokia 1.3 Android 11 (Go Edition) update. You will be prompted to download the update, or you can check it in the Settings menu, check for system updates, and then check for the update.
Nokia 1.3 Android 11 (Go Edition) Update Change Log:
Nokia 1.3 improves stability and user interface with the new Android 11 version. Unfortunately, HMD Global does not announce when the other regions will receive the update. However, he says the second wave will cover all regions. This means that when the next wave of deployment begins, the update should be available in all other markets. The entry states that the software architecture must be implemented for 100% of the units by July 24, which happens to happen today.
What's New - Manage your conversations: Get all your messages in one place - One-time permissions: Give one-time permissions to apps that need a microphone, location camera - Google Play system updates: More security. and privacy patches sent to your phone, directly on Google Play - Google 2021-03 Security Patch Advice Notice - We encourage users to use Wi-Fi wherever possible to download updates. If you want to use a mobile phone connection, please note that downloading data over a mobile network (including roaming) may incur additional costs - contact your network operator if you have any problems.
The most serious of these problems is a critical vulnerability in the System Component that could allow a remote attacker to execute arbitrary code using a specially crafted transfer in a privileged process. The severity assessment is based on the potential impact that exploiting the vulnerability could have on the affected device, provided that platform and service mitigation is disabled for development purposes or is successfully circumvented.