Google has just released images to their Nexus devices promised monthly security updates. Now we know how fast will the major manufacturers and operators to distribute to users.
more than a month ago something Stagefright, the most worrying vulnerability recalled in Android for its severity and number of affected devices , questioned the worrying state of Android updates , dependent on Google, producers and operators. Something which in itself is a problem, very serious problem if it comes to security.
New versions of Android eliminated the vulnerability and the waters seem to be calmer but, thanks to Stagefright, we saw a real movement by Google, manufacturers and operators to change the upgrade policy. monthly updates were promised with the latest vulnerabilities resolution to the world’s adopted operating system.
Google after more than 30 days has already published the first images in line with the plan for their Nexus devices. It is the build “LMY48M” for Nexus 4, 5, 6, 7, 9 and 10, with another build for Nexus Android TV. Thanks to the changelog see that most corrections are intended to change the management of memory and close the doors to potential overflows , ie prevent possible inputs malicious code with privileges that should not have.
The most interesting news is the “timing” the times of others. In the absence of a system-wide updates, these changes, whether or safety are responsibility of manufacturers and operators . Updates also are individual for each model.
This is the big problem of Android, the complexity and the wide range of devices and carriers that form. For example, in the US, T-Mobile has already announced OTA updates for Nexus whole family a day before Google. The support page as indicated in Arstechnica ensures that the update has just arrived for the Samsung Galaxy Note Samsung S6 and 5, so it was incredibly fast. Also come to the LG G4. But what about the rest of the operators and devices that are not emblems of each brand?
It is interesting to know how much will change policy updates and how capable is to fix the vulnerabilities discovered every month cybercriminals.
No comments:
Post a Comment