Nokia Mobile has now expanded release of November security update to more smartphones. Nokia G21 is receiving the November security update 2022 now. Nokia 8.3 5G is also receiving a new Android 12 build with November Security update now. Check below for the November Security update size, list of markets and the update changelog for Nokia G21 and Nokia 8.3 5G.
On the basis of tips received from our readers, we will collate a list of markets for Nokia G21 and Nokia 8.3 5G in which November security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.
List of markets:
- Nokia 8.3 5G in India, Egypt & Finland
- Nokia G21 in Germany
Nokia 8.3 5G November security update size:
Nokia 8.3 5G is receiving a new Android 12 Build V3.490 with the November security update (561 MB in size depending upon markets). You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia G21 November security update size:
The update size for Nokia G21 is 15.56 MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia G21 and Nokia 8.3 5G update changelog:
Nokia 8.3 5G is receiving a new Android 12 Build along with the 2022 November Android security update. The changelog for new builds mentions the generic “improved system stability” and “UI enhancements”. Nokia G21 is receiving only the 2022 November Android security patch with the update. Here is what the November security update addresses as mentioned by Google on its official Security bulletin page.
The most severe of these issues is a high security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
Thanks, Hotlain, Uday, Sven, & Matti for the tip. Cheers!!