Nokia XR20 5G gets new Android 13 build, Nokia G50 5G & Nokia G21 get December Security update

(*13*) Mobile has launched a new Android 13 Build to (*13*) XR20 5G. (*13*) Mobile has additionally expanded the roll-out of December safety update 2023 to (*13*) XR20 5G, (*13*) G50 5G and (*13*) G21. The safety update brings solely the Google Android patch for the month of December.For all software program update information associated to different (*13*) smartphones click on right here. If you need to observe December update roll-out to (*13*) smartphones you are able to do it right here.Check beneath for the December Security update measurement, record of markets and the update changelog for (*13*) XR20 5G, (*13*) G50 5G and (*13*) G21. On the idea of ideas obtained from our readers, we are going to collate an inventory of markets for (*13*) XR20 5G, (*13*) G50 5G and (*13*) G21 wherein updates are actually obtainable. So, do tell us you probably have obtained the update within the feedback part. You may strive the VPN trick for getting the update and see if it really works.List of markets:(*13*) XR20 5G in India(*13*) G50 5G in US(*13*) G21 in India(*13*) XR20 5G Android 13 + December safety update measurement:The update measurement for (*13*) XR20 5G is 114 MB. The update additionally brings Android 13 Build V3.410. You will both be prompted to obtain this update, or you may verify by going to Settings and looking system updates after which by checking for the update.(*13*) XR20 5G, (*13*) G50 5G and (*13*) G21 Android 13 construct + December update changelog:(*13*) XR20 5G has obtained a new Android 13 construct. The official changelog solely mentions generic UI enhancements and stability enhancements. (*13*) XR20 5G, (*13*) G50 5G and (*13*) G21 can be receiving the 2023 December Android safety patch with the update. Here is what the December safety update addresses as talked about by Google on its official Security bulletin web page.The most extreme of those points is a vital safety vulnerability within the System part that might result in distant (proximal/adjoining) code execution with no further execution privileges wanted. User interplay will not be wanted for exploitation. The severity evaluation is predicated on the impact that exploiting the vulnerability may have on an affected machine, assuming the platform and repair mitigations are turned off for improvement functions or if efficiently bypassed.Thanks, Uday, & Tim for the tip. Cheers!!Please observe us on our new Facebook Page “NPU” by clicking right here.

Recommended For You