Nokia 3 users are getting a new Oreo Beta Build that also brings the March Security update with itself. The Oreo build number is V3.250 and it is available in some of the markets for Nokia 3 running Android Oreo Beta.
The March Security update brings a fix for a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. For all software update news related to other Nokia phones click here.
On the basis of tips received from our readers, we will collate a list of markets and the Nokia 3 variants for which March Security update is now available. So, do let us know if you have received the update in the comments section.
List of markets where it is available:
- In Jordan TA-1032
- In India TA-1032
- In Thailand TA-1032
You will either be prompted to download this update or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia 3 Oreo Beta + March Security update changelog:
Read the full changelog for March Security patch update by clicking here.
The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Theseverity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
We have had no reports of active customer exploitation or abuse of these newly reported issues. Refer to theAndroid and Google Play Protect mitigations section for details on the Android security platform protections and Google Play Protect, which improve the security of the Android platform.
You can, however, take a deep dive of Android Oreo and check our updated complete list of Android Oreo changes and features for Nokia Android smartphones by clicking here.
Thanks احمد فرحات @G6Uh97GjwdJWuD for the tip and screenshots. Cheers!!