Google Seeds LG Nexus 4, LG Nexus 5, Motorola Nexus 6, Asus Nexus 7, HTC Nexus 9 Security Update
A recent Latin Post article indicated that Sony has begun rolling out the latest Android OS update for older Xperia models.
Now, a fresh report suggests that Google refuses to be outdone.
According to Android Police, the world's foremost search engine and mobile platform company has just started seeding its newest security update to older Nexus smartphones.
Where it currently stands, the patch is now available via over-the-air distribution for users of the LG Nexus 4, LG Nexus 5, Motorola Nexus 6, Asus Nexus 7, and HTC Nexus 9.
"All of these devices are about to receive a new software build, yet the Android version will stay at 5.1.1 even after you apply the update. The new build number is LMY48M, and this should be identical for all of the aforementioned products except carrier versions of the Nexus 6. In this case there will be different build numbers - for example T-Mobile's is LYZ28K," GSM Arena explained.
The roll out isn't much of a shocker at all since lead engineer for Android security Adrian Ludwig promised in a blog post last August 2015 that "Nexus devices will receive regular OTA updates each month." He reiterated that the updates will mostly carry security patches but will have the usual platform enhancements as well.
Google has apparently stuck to their word with the latest update. Users of the aforementioned Nexus models wouldn't wait too long for the updates to download and install since it comes in a relatively small data size. It's only 30MB for the T-Mobile Nexus 6 and 20MB for the other Nexus models. As promised, the update carries minimal new features but has fixes for minor security and bug issues.
It can be recalled that mobile manufacturers were scrambling to develop and seed out software updates last month due to the emergence of the "Stagefright" vulnerability.
The exploitable software bug was first uncovered by Joshua Drake from Zimperium Research Labs in April 2015, as per the lab's official website.
"Attackers only need your mobile number, using which they can remotely execute code via a specially crafted media file delivered via MMS. A fully weaponized successful attack could even delete the message before you see it. You will only see the notification. These vulnerabilities are extremely dangerous because they do not require that the victim take any action to be exploited," Ziperium said.
The researching company mentioned that the "Stagefright" bug could possibly victimize 95 percent of all Android devices, which, in hindsight, totals to roughly 950 million units.
It affects devices running on Android 2.2 "Froyo" and newer. Devices running on OS older than the Jelly Bean have the highest exploitation risk since software updates for these OS versions are rare.
Subscribe to Latin Post!
Sign up for our free newsletter for the Latest coverage!
* This is a contributed article and this content does not necessarily represent the views of latinpost.com