Nokia G20 new Android 11 and November security update03. 12. 2021 Friday / By: Robert Denes / Software / Exact time: BST / Print this page
N okia Mobile has made available the new Android 11 version and the November security update for the Nokia G20 smartphone, which is now available in several regions. See the update size, list of markets, and update change log below.
List of markets:
Nokia G20 Android 11 build + November security update size:
The update size of the Nokia G20 is 590 MB. You will be prompted to download this update or you can check it by checking for system updates in the Settings menu and then checking for the update.
Nokia G20 November Security Update Change Log:
The Nokia G20 will receive Android 11 Build V1.180 along with the November security update. It is not clear what changes this new build will bring, but it may include some important fixes and performance improvements.
The most serious of these is a high vulnerability in the Media Framework component that could allow a local malicious application to bypass operating system protection, which separates application data from other applications. The severity assessment is based on the potential impact that exploiting the vulnerability could have on the affected device, provided that the platform and downgrading are disabled for development purposes or successfully bypassed.What's New - Manage your conversations: Get all your messages in one place - One-time permissions: Give one-time permissions to apps that need a microphone, location camera - Google Play system updates: More security. and privacy patches sent to your phone, directly on Google Play - Google 2021-03 Security Patch Advice Notice - We encourage users to use Wi-Fi wherever possible to download updates. If you want to use a mobile phone connection, please note that downloading data over a mobile network (including roaming) may incur additional costs - contact your network operator if you have any problems.
The most serious of these problems is a critical vulnerability in the System Component that could allow a remote attacker to execute arbitrary code using a specially crafted transfer in a privileged process. The severity assessment is based on the potential impact that exploiting the vulnerability could have on the affected device, provided that platform and service mitigation is disabled for development purposes or is successfully circumvented.