[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["必要な情報がない","missingTheInformationINeed","thumb-down"],["複雑すぎる / 手順が多すぎる","tooComplicatedTooManySteps","thumb-down"],["最新ではない","outOfDate","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["サンプル / コードに問題がある","samplesCodeIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-08-05 UTC。"],[],[],null,["# Wear OS Security Bulletin—January 2024\n\n*Published January 3, 2024*\n\n\nThe Wear OS Security Bulletin contains details of security vulnerabilities\naffecting the Wear OS platform.\nThe full Wear OS update comprises the security patch level of 2024-01-05 or\nlater from the [January 2024 Android Security Bulletin](/security/bulletin/2024-01-01) in addition to\nall issues in this bulletin.\n\n\nWe encourage all customers to accept these updates to their devices.\n| **Note**: Please contact your device supplier for device firmware images.\n\nAnnouncements\n-------------\n\n- In addition to the security vulnerabilities described in the January 2024 Android Security Bulletin, the January 2024 Wear OS Security Bulletin also contains patches specifically for Wear OS vulnerabilities as described below.\n\n2024-01-05\nsecurity patch level vulnerability details\n-----------------------------------------------------\n\n\nIn the sections below, we provide details for each of the security\nvulnerabilities that apply to the 2024-01-05 patch level.\nVulnerabilities are grouped under the component they affect.\nIssues are described in the tables below and include CVE ID, associated\nreferences, [type of vulnerability](#type),\n[severity](/security/overview/updates-resources#severity),\nand updated AOSP versions (where applicable).\nWhen available, we link the public change that addressed the issue to the\nbug ID, like the AOSP change list.\nWhen multiple changes relate to a single bug, additional references are\nlinked to numbers following the bug ID.\n\n### Qualcomm components\n\n\nThis vulnerability affects Qualcomm components and are described in further\ndetail in the appropriate Qualcomm security bulletin or security alert.\nThe severity assessment of this issue is provided directly by Qualcomm.\n\n| CVE | References | | Severity | Subcomponent |\n|----------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---|----------|--------------|\n| CVE-2023-33085 | A-304307278 [QC-CR#3512209](https://git.codelinaro.org/clo/la/kernel/msm-5.4/-/commit/8b22a153a6396e22614aeddde0d2176be14b93d8%20https://git.codelinaro.org/clo/la/kernel/msm-4.14/-/commit/330e477773663acc022668ab82f9c50a3157559c%20https://git.codelinaro.org/clo/la/kernel/msm-5.4/-/commit/ce4331ec45a34c12af33f006176ce782e3674230) | | High | Security |\n\nCommon questions and answers\n----------------------------\n\nThis section answers common questions that may occur after reading this\nbulletin.\n\n**1. How do I determine if my device is updated to address these\nissues?**\n\nTo learn how to check a device's security patch level, read the\ninstructions on the\n[Google device update schedule](https://support.google.com/android/answer/7680439).\n\n- Security patch levels of 2024-01-05 or later address all issues associated with the 2024-01-05 security patch level and all previous patch levels.\n\nDevice manufacturers that include these updates should set the patch string\nlevel to:\n\n- \\[ro.build.version.security_patch\\]:\\[2024-01-05\\]\n\nFor some devices on Android 10 or later, the Google Play system update\nwill have a date string that matches the 2024-01-01\nsecurity patch level.\nPlease see [this article](https://support.google.com/android/answer/7680439?hl=en) for more details on how to\ninstall\nsecurity updates.\n\n\n**2. What do the entries in the *Type* column mean?**\n\nEntries in the *Type* column of the vulnerability details table\nreference the classification of the security vulnerability.\n\n| Abbreviation | Definition |\n|--------------|------------------------------|\n| RCE | Remote code execution |\n| EoP | Elevation of privilege |\n| ID | Information disclosure |\n| DoS | Denial of service |\n| N/A | Classification not available |\n\n\n**3. What do the entries in the *References* column mean?**\n\nEntries under the *References* column of the vulnerability details\ntable may contain a prefix identifying the organization to which the\nreference value belongs.\n\n| Prefix | Reference |\n|--------|---------------------------|\n| A- | Android bug ID |\n| QC- | Qualcomm reference number |\n| M- | MediaTek reference number |\n| N- | NVIDIA reference number |\n| B- | Broadcom reference number |\n| U- | UNISOC reference number |\n\n\n**4. What does an \\* next to the Android bug ID in the *References*\ncolumn mean?**\n\nIssues that are not publicly available have an \\* next to the corresponding\nreference ID. The update for that issue is generally contained in the latest\nbinary drivers for Pixel devices available from the\n[Google\nDeveloper site](https://developers.google.com/android/drivers).\n\n**5. Why are security vulnerabilities split between this bulletin and\ndevice / partner security bulletins, such as the\nPixel bulletin?**\n\nSecurity vulnerabilities that are documented in this security bulletin are\nrequired to declare the latest security patch level on Android\ndevices. Additional security vulnerabilities that are documented in the\ndevice / partner security bulletins are not required for\ndeclaring a security patch level. Android device and chipset manufacturers\nmay also publish security vulnerability details specific to their products,\nsuch as\n[Google](/security/bulletin/pixel),\n[Huawei](https://consumer.huawei.com/en/support/bulletin/),\n[LGE](https://lgsecurity.lge.com/security_updates_mobile.html),\n[Motorola](https://motorola-global-portal.custhelp.com/app/software-security-page/g_id/6806),\n[Nokia](https://www.nokia.com/phones/en_int/security-updates),\nor\n[Samsung](https://security.samsungmobile.com/securityUpdate.smsb).\n\nVersions\n--------\n\n| Version | Date | Notes |\n|---------|-----------------|---------------------|\n| 1.0 | January 3, 2024 | Bulletin published. |"]]