Nokia Mobile has now expanded release of December security update to more smartphones. Both Nokia 3.4 & Nokia 5.4 are receiving a new Android 12 build with December Security update now. Check below for the December Security update size, list of markets and the update changelog for Nokia 3.4 & Nokia 5.4.
On the basis of tips received from our readers, we will collate a list of markets for Nokia 3.4 & Nokia 5.4, where the new Android 12 build and December security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.
List of markets:
- Nokia 3.4 in India & Egypt
- Nokia 5.4 in India & Egypt
Nokia 3.4 Android 12 + December security update size:
Nokia 3.4 is receiving a new Android 12 Build V3.40 with the December security update (452 MB in size depending upon markets). You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia 5.4 Android 12 + December security update size:
Nokia 5.4 is receiving a new Android 12 Build V3.380 with the December security update (1.8GB and 132MB in size depending upon markets). You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia 3.4 & Nokia 5.4 update changelog:
Both Nokia 3.4 & Nokia 5.4 are receiving new Android 12 Builds along with the 2022 December Android security update. The changelog for new builds mentions the generic “improved system stability” and “UI enhancements”. Here is what the December security update addresses as mentioned by Google on its official Security bulletin page.
The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution over Bluetooth with no additional execution privileges needed. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
Thanks, Rupam and Hotlain for the tip. Cheers!!