Nexus 4, 5, 6, 7 And 9 Receive First Batch Of Monthly Security Updates

Google reportedly released a security update pack for the Nexus line of devices running on Android's latest version, Lollipop 5.1.1. The fix targets LG Nexus 4 and 5, Nexus 6 from Motorola, Asus Nexus 7, Nexus 9 from HTC and Samsung Nexus 10.

Google's latest Android security update package has been available since Sept. 9 and comes as part of the company's promised monthly security updates following the vulnerabilities presented by "Stagefright", a code that allows hackers to take control of mobile devices without any required action from the user/owner.

"These vulnerabilities are extremely dangerous because they do not require that the victim take any action to be exploited," said Ziperium in an article posted last July 27. "Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep."

The security flaw was first reported by Joshua J. Drake, Ziperium zLabs VP of Platform Research and Exploration. The mobile security company claims that 95 percent of Android devices, which is about 950 million, are exposed to the threat with varying degrees of vulnerability depending on the Android version.

Upon checking the Nexus system image repository, the current security update is reflected as build LMY48M for most of the listed products except for Nexus 6 versions that came off certain network carriers. For instance, T-Mobile, which actually released the security fix ahead of Google, has LYZ28K as its security update build number.

As follows, just like T-Mobile, it should be expected that other carriers having their proprietary OTA programming will have a different build number for the said update. Even Google's Nexus Player also got the security update with a different build number, which is shown as build LMY48N in the repository.

Note that this is a security update pack and not an upgrade from the current OS version.

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion
Real Time Analytics