Nokia 3.1 and Nokia 4.2 April Security Patch08. 05. 2021 Saturday / By: Robert Denes / Software / Exact time: BST / Print this page
Nokia Mobile has made the April security patch available for newer Nokia devices, this time Nokia 3.1 and Nokia 4.2 smartphones. This update must be available globally, so check versions 3.1 and 4.2 and update. The update is now available in several regions. Check the size of the April security updates, the list of markets, and the update change log.
List of markets:
Nokia 3.1 April Security Update Size:
The size of the Nokia 3.1 update is 60.78 MB. You will be prompted to download the update, or you can check it in the Settings menu, check for system updates, and then check for the update.
Nokia 4.2 April Security Update Size:
The April 4.2 security patch for Nokia is the first update since this device received Android 11 and is only 8.12 MB. You will be prompted to download the update, or you can check it in the Settings menu, check for system updates, and then check for the update.
Nokia 3.1 and Nokia 4.2 April Security Update Change Log:
The Nokia 3.1 and Nokia 4.2 will only receive the April 2021 Android security patch with the update. Here is the title of the April security update that Google mentioned on the official security bulletin page.
What's New - Manage your conversations: Get all your messages in one place - One-time permissions: Give one-time permissions to apps that need a microphone, location camera - Google Play system updates: More security. and privacy patches sent to your phone, directly on Google Play - Google 2021-03 Security Patch Advice Notice - We encourage users to use Wi-Fi wherever possible to download updates. If you want to use a mobile phone connection, please note that downloading data over a mobile network (including roaming) may incur additional costs - contact your network operator if you have any problems.
The most serious of these problems is a critical vulnerability in the System Component that could allow a remote attacker to execute arbitrary code using a specially crafted transfer in a privileged process. The severity assessment is based on the potential impact that exploiting the vulnerability could have on the affected device, provided that platform and service mitigation is disabled for development purposes or is successfully circumvented.