September's security updates have been posted for most of the Nexus family, although a few devices are still mysteriously lagging behind on official Nougat images. The source code for most of the changes has been uploaded to the Android Open Source Project (AOSP) and we've generated a list of those changes for quick and easy viewing. The security bulletin already details most of the issues resolved this month, but there may be additional details lurking behind the code, so feel free to take a look around.
There are currently five new builds posted: three for Marshmallow (MMB30W, MOB31E, MTC20K) and two for Nougat (NRD90R, NRD90S). Read More
The odds are pretty good that if you're using a still-supported Nexus device, it's probably running August's security update by now. The factory images became available on Monday of last week and OTAs have been intermittently rolling out since then. The push to AOSP took a little longer and finally included a couple of other tags that were behind schedule. All of the changes have been compiled into their respective lists and the changelogs are ready for perusal.
Google's Android Security Bulletin details the potential vulnerabilities addressed by the August updates, but it's not too rare to see other small bug fixes and adjustments hidden among the changes. Read More
AT&T is finally catching up on its Marshmallow OTA rollouts to its fleet of Android devices. And today's lucky winner of "Which device will get an OTA?" is the Samsung Galaxy Tab S 2 (T817A).
Mouthful name aside, this may not be the most exciting tablet on the market, but it still deserves to be on the latest and greatest software version possible — even if only for a short time until Nougat is official. And it also deserves to catch up to its Verizon colleague: nobody wants to be left behind more than a month.
Apparently, the software has been rolling out since July 8, but AT&T just decided to update its support page (raise your hand if you see a trend of late updates in everything AT&T does lately). Read More
July's security updates went live a couple of days ago for all of the currently supported Nexus devices. The Pixel C is still unaccounted for, but it's not that unusual for it to lag a few days behind. There were some late-breaking updates for hardware drivers this month, which may also contribute to some delay on the Pixel C. In the meantime, there are plenty of changes to check out this month.
There are eight separate changelogs this month, but some of these are empty, created for Google's internal use. I've marked the ones that simply change a build number. As usual, Google's security bulletin contains explanations for most of the changes, but there are probably a couple of subtle bug fixes too. Read More
June's security updates are now available for all of the currently supported Nexus (and Pixel C) devices. As usual, the code changes to go along with this month's new firmware have been uploaded to AOSP and we've got some changelogs to look through. While it's a bit late, Google also uploaded the code changes for N Developer Preview 3. As usual, this isn't a complete release of N, but mostly just the code for projects licensed under the GPL.
Google has already posted the security bulletin, which describes the lion's share of changes. Most of the issues resolved in this version have to do with vulnerabilities in Qualcomm drivers. Read More
If you're curious about what has changed in the latest round of factory images for the Nexus family, there aren't many better ways to see the bare details than to browse through the changes exactly as they are written in the Android Open Source Project. We've generated changelogs from the available code commits from the latest round of updates. So far, this only includes the MOB30G-MOB30J builds, but the rest should be coming soon.
May's changelogs are pretty brief, owing basically all of their contents to the security-related fixes. In fact, of the currently available changelogs, it's only r40 (MOB30G) that contains anything of substance. Read More
Nextbit pre-announced its big April update a few weeks ago, and now it's starting to hit devices. Not only does this bump the device up to the current version of Android with new security patches, it includes tweaks to the camera that apparently make it much faster and better. Read More
The factory images are up–some of them–so it's time to take a peek under the covers to discover any changes made to the Android Open Source Project for April's security updates. To make this a bit easier, we've generated changelogs based on the commit history that was just posted to AOSP last night.
As you might expect, the majority of the changes are going to be related to the issues set forth in the April Security Bulletin. A few others appear to be relatively small bug fixes, but nothing jumps out at me as a change that will directly affect user experience or any particularly noticeable bugs. Read More
The latest factory images for the Nexus family have landed and people are getting their updates. What are they updating to? The changelogs built from developer comments can probably answer that, or at least give some pretty good hints.
Like most of the monthly updates, at least since Google started this practice, March's update focuses on security. Google already posted a detailed accounting of the security issues addressed with this release, and most of the changelogs appear to line up almost exactly. We're not going to find much in the way of performance improvements or bug fixes for usability problems. Read More
February's batch of factory images started turning up earlier today and Google followed up with a push to AOSP a few hours later. As usual, we've got some changelogs to look over. The focus this month appears to be entirely on sealing any holes that could be used by bad people to do bad things.
Google posted a security bulletin with a list of fixes found in this release, and there are a few pretty big ones this month. Five items have been tagged Critical, including two that allowed for remote code execution without any user interaction, and the remaining three could have been used for privilege escalation. Read More