Days after releasing the January Android security patch for Pixel and Nexus devices, Google has now ostensibly pushed a new OTA (over-the-air) update for its Pixel 2 devices. Some users have confirmed the rollout of the new update that brings build number OPM2.171019.016. However, Google hasn’t yet listed the same version on its factory images or OTA downloads pages.
Some Google Pixel 2 users have reported the rollout of the new Android update on Reddit, as spottedby folks at 9to5Google. “I got it too, new build number, OPM2.171019.016. Maybe bug fix, I know we need some of those,” one of the Redditors wrote in response to the first source who also provided a couple of screenshots evidently showing the latest build. The provided screenshots highlight that the new OTA update doesn’t make any changes to the Android security patch. Also, the Android version is 8.1.0 (Oreo) that was released last month.
The list of changes that come through the fresh out-of-cycle OTA update is mysterious so far. But one of the users on Reddit points out that the update fixes Google Assistant to enable shuffling of tracks from the native music library. Contrarily, another user on the same thread claims that the update brings a battery draining issue.
If we take a look at some of the recent reports, there are issues with third-party mesh routers and the default ‘Now Playing’ song recognition feature are yet to be addressed. The new update might resolve some of them.
We’ve reached out to Google to get more clarity on the new OTA update for the Pixel 2 devices and will update this space accordingly.
Earlier this month, Google released the January Android security update as its next big OTA rollout for compatible Pixel and Nexus devices, including the Pixel 2, Pixel 2 XL, Pixel, and Pixel XL among others. The update mainly resolved 38 issues through two different patches dated 2018-01-01 and 2018-01-05. Amongst other vulnerabilities, the security update also patched the vulnerability related to the media framework that could let a remote attacker execute arbitrary code within the context of a privileged process.