Nokia Mobile has now released the December security update 2022 to Nokia X30 5G & Nokia G20 too. The update brings only the Google Android patch update for the month of December 2022. Check below for the December Security update size, list of markets and the update changelog for Nokia X30 5G & Nokia G20.
For all software update news related to other Nokia smartphones click here. If you want to track December security update roll-out to Nokia smartphones you can do it here.
On the basis of tips received from our readers, we will collate a list of markets for Nokia X30 5G & Nokia G20 in which December security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.
List of markets:
- Nokia X30 5G in France & Malaysia
- Nokia G20 in Serbia & Poland
Nokia X30 5G December security update size:
The update size for Nokia X30 5G is 99.60 MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia G20 December security update size:
The update size for Nokia G20 is 28.97 MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia X30 5G & Nokia G20 December security update changelog:
Nokia X30 5G & Nokia G20 are receiving only the 2022 December Android security patch with the update. Here is what the December security update addresses as mentioned by Google on its official Security bulletin page.
The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution over Bluetooth with no additional execution privileges needed. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
Thanks, Kristijan, JojoPoland and Thomas for the tip. Cheers!!