What’s new in the latest security update from Google
Security patches are frequent for smartphones, and there are easy ways to keep up to date on your phone in particular. If you’re curious about what’s changed on Android, you’ve come to the right place.
These are exploits and other security concerns that affect Android as a whole. Issues with the operating system, kernel patches, and driver updates may not affect any particular device, but these need to be fixed in the Android base by the folks maintaining the operating system code — you know, Google. The company has detailed the things it’s improved for this month.
Updated factory images for Pixel devices that are still supported are available, and over-the-air updates are rolling out to users. If you don’t want to wait, you can download and flash the factory image or OTA update file manually. Follow the link to get started.
The company that made your phone uses these patches to send an update out to you.
These changes have been released to the people making the best Android phones for at least 30 days, but Google can’t force anyone to deliver them to you. So if you’re using a phone from Samsung, Motorola, or anybody else besides Google, you’ll need to wait for them to send an update and shouldn’t try to flash any of the above files. It might have already happened, as OEMs can send out the patch before the deadline Google must adhere to so that the exploits aren’t publicized.
Of course, Google has safety checks in place to prevent any problems on your phone due to security exploits. Verify Apps and SafetyNet are at work anytime you add an app to your phone, and seamless updates to Google Play Services will keep them up to date regardless of any hold-up from a manufacturer or carrier. Details about Android Enterprise Security can be found here.
Highlights of the June 2023 security bulletin
- The June 2023 update addressed high-severity issues and a critical issue in the Android Framework.
- The Android permission controller was updated through Project Mainline in June 2023.
- Vendor-specific patches from ARM, Imagination, Qualcomm, Unisoc, and Widevine are available for devices using components from those manufacturers.