パッチレベル 2024-09-01 に該当するセキュリティ脆弱性の各項目について、以下で詳細を説明します。脆弱性は、影響を受けるコンポーネントごとに分類しています。問題の説明に続いて、CVE ID、関連する参照先、脆弱性のタイプ、重大度、更新対象の AOSP バージョン(該当する場合)を表にまとめています。該当する場合は、バグ ID の欄に、その問題に対処した一般公開されている変更(AOSP の変更の一覧など)へのリンクがあります。複数の変更が同じバグに関係する場合は、バグ ID の後に記載した番号に、追加の参照へのリンクを設定しています。Android 10 以降を搭載したデバイスは、セキュリティ アップデートと Google Play システム アップデートを受信することがあります。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["必要な情報がない","missingTheInformationINeed","thumb-down"],["複雑すぎる / 手順が多すぎる","tooComplicatedTooManySteps","thumb-down"],["最新ではない","outOfDate","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["サンプル / コードに問題がある","samplesCodeIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-08-05 UTC。"],[],[],null,["# Android Automotive OS Update Bulletin—September 2024\n\n*Published September 3, 2024*\n\nThe Android Automotive OS (AAOS) Update Bulletin contains\ndetails of security vulnerabilities affecting the Android\nAutomotive OS platform. The full AAOS update comprises the\nsecurity patch level of 2024-09-05 or later from the [September 2024 Android Security Bulletin](/security/bulletin/2024-09-01) in\naddition to all issues in this bulletin.\n\nWe encourage all customers to accept these updates to their\ndevices.\n| **Note**: Please contact your device supplier for device firmware images.\n\nThe issue in this bulletin is a high security vulnerability in\nthe System component that could lead to local escalation of\nprivilege with no additional execution privileges needed. The\n[severity assessment](/security/overview/updates-resources#severity) is based on the effect\nthat exploiting the vulnerability would possibly have on an\naffected device, assuming the platform and service mitigations\nare turned off for development purposes or if successfully\nbypassed.\n\nAnnouncements\n-------------\n\n- In addition to the security vulnerabilities described in the September 2024 Android Security Bulletin, the September 2024 Android Automotive OS Update Bulletin also contains patches specifically for AAOS vulnerabilities as described below.\n\n2024-09-01 security patch level vulnerability details\n-----------------------------------------------------\n\nIn the sections below, we provide details for each of the\nsecurity vulnerabilities that apply to the 2024-09-01 patch\nlevel. Vulnerabilities are grouped under the component they\naffect. Issues are described in the tables below and include CVE\nID, associated references, [type of\nvulnerability](#type), [severity](/security/overview/updates-resources#severity), and updated AOSP versions (where\napplicable). When available, we link the public change that\naddressed the issue to the bug ID, like the AOSP change list.\nWhen multiple changes relate to a single bug, additional\nreferences are linked to numbers following the bug ID. Devices\nwith Android 10 and later may receive security updates as well as\n[Google Play system updates](https://support.google.com/android/answer/7680439?).\n\n### System\n\nThe vulnerability in this section\ncould lead to local escalation of privilege with no additional\nexecution privileges needed.\n\n| CVE | References | Type | Severity | Updated AOSP versions |\n|----------------|-------------|------|----------|-----------------------|\n| CVE-2024-40667 | A-335585728 | EoP | High | 13, 14 |\n\nCommon questions and\nanswers\n----------------------------\n\nThis section answers common questions that may occur after\nreading this bulletin.\n\n**1. How do I determine if my device is updated to\naddress these issues?**\n\nTo learn how to check a device's security patch level, read\nthe instructions on the [Google device update\nschedule](https://support.google.com/android/answer/7680439).\n\n- Security patch levels of 2024-09-01 or later address all issues associated with the 2024-09-01 security patch level.\n\nDevice manufacturers that include these updates should set the\npatch string level to:\n\n- \\[ro.build.version.security_patch\\]:\\[2024-09-01\\]\n\nFor some devices on Android 10 or later, the Google Play\nsystem update will have a date string that matches the 2024-09-01\nsecurity patch level. Please see [this article](https://support.google.com/android/answer/7680439?hl=en) for more details on\nhow to install security updates.\n\n**2. What do the entries in the *Type* column\nmean?**\n\nEntries in the *Type* column of the vulnerability\ndetails table reference the classification of the security\nvulnerability.\n\n| Abbreviation | Definition |\n|--------------|------------------------------|\n| RCE | Remote code execution |\n| EoP | Elevation of privilege |\n| ID | Information disclosure |\n| DoS | Denial of service |\n| N/A | Classification not available |\n\n**3. What do the entries in the *References*\ncolumn mean?**\n\nEntries under the *References* column of the\nvulnerability details table may contain a prefix identifying the\norganization to which the reference value belongs.\n\n| Prefix | Reference |\n|--------|---------------------------|\n| A- | Android bug ID |\n| QC- | Qualcomm reference number |\n| M- | MediaTek reference number |\n| N- | NVIDIA reference number |\n| B- | Broadcom reference number |\n| U- | UNISOC reference number |\n\n**4. What does an \\* next to the Android bug ID in the\n*References* column mean?**\n\nIssues that are not publicly available have an \\* next to the\ncorresponding reference ID. The update for that issue is\ngenerally contained in the latest binary drivers for Pixel\ndevices available from the [Google Developer site](https://developers.google.com/android/drivers).\n\n**5. Why are security vulnerabilities split between this\nbulletin and device / partner security bulletins, such as the\nPixel bulletin?**\n\nSecurity vulnerabilities that are documented in this security\nbulletin are required to declare the latest security patch level\non Android devices. Additional security vulnerabilities that are\ndocumented in the device / partner security bulletins are not\nrequired for declaring a security patch level. Android device and\nchipset manufacturers may also publish security vulnerability\ndetails specific to their products, such as [Google](/security/bulletin/pixel), [Huawei](https://consumer.huawei.com/en/support/bulletin/), [LGE](https://lgsecurity.lge.com/security_updates_mobile.html), [Motorola](https://motorola-global-portal.custhelp.com/app/software-security-page/g_id/6806), [Nokia](https://www.nokia.com/phones/en_int/security-updates), or [Samsung](https://security.samsungmobile.com/securityUpdate.smsb).\n\nVersions\n--------\n\n| Version | Date | Notes |\n|---------|-------------------|--------------------|\n| 1.0 | September 3, 2024 | Bulletin published |"]]