Google has been very consistent in its promise to release monthly security patches for Android, at least for its own Pixel and Nexus devices. July’s patch has just been posted on the Google Developer’s site, as well as a changelog detailing all the security holes that have been patched.
The following devices have new builds available (list via Android Police):
- Pixel – NJH47D, NHG47O (Verizon), NKG47M (T-Mobile), NZH54B (Deutsche Telekom)
- Pixel XL –NJH47D, NHG47O (Verizon), NKG47M (T-Mobile), NZH54B (Deutsche Telekom)
- Pixel C – N2G48B
- Nexus 6P – N2G48B
- Nexus 5X – N2G47Z
- Nexus 6 – N6F27H
- Nexus Player – N2G48B
- Nexus 9 LTE – N9F27F
- Nexus 9 Wi-Fi – N4F27I
As usual, Google has released both system images and OTA updates. The OTA files will be what most users should download, as they are just an update and don’t require an unlocked bootloader. Tinkerers and developers that have unlocked their device bootloaders and may be running another ROM or custom software may want to snag the latest system image for their phone or tablet. These can be used to reload the stock OS and install the latest security patch.
Keep in mind that the system builds are currently only available as a sideload, but the OTA updates should be available for download via Android’s update manager. Google has stated that the code for the source code for these updates should be in the Android Open Source Project repository sometime over the next 2 days.
A full list of security details can be found in the Android Security Bulletin for this month, but the most severe issue involves a vulnerability in the media framework that could be exploited with arbitrary code execution. Google said that the company was not aware of any current uses of these exploits.
To download the latest security updates for your Pixel or Nexus, head over to the July Android Security Bulletin (link below). System images can be found here, and the OTA update can be found here.
Are you a techie who knows how to write? Then join our Team! Wanted:
- News Writer (Romania based)
Details here