自 2025 年 3 月 27 日起,我們建議您使用 android-latest-release
而非 aosp-main
建構及貢獻 AOSP。詳情請參閱「Android 開放原始碼計畫變更」。
Wear OS 安全性公告 - 2024 年 12 月
透過集合功能整理內容
你可以依據偏好儲存及分類內容。
發布日期:2024 年 12 月 2 日
Wear OS 安全性公告列舉對 Wear OS 平台造成影響的安全漏洞,並說明相關細節。
完整的 Wear OS 更新除了提供 2024 年 12 月 Android 安全性公告中的安全性修補程式等級 (2024-12-05 之後),也解決這個公告列出的所有問題。
我們建議所有客戶接受這些裝置更新。
在這些問題中,最嚴重的是系統元件中嚴重程度「高」的安全漏洞。這類漏洞可能讓攻擊者不必取得額外執行權限,即可提升本機權限。嚴重程度評定標準是假設平台與服務的因應防護措施基於開發作業需求而關閉,或是遭到有心人士成功規避,然後推算當有人惡意運用漏洞時,使用者裝置會受到多大影響,並據此評定漏洞的嚴重程度。
公告事項
- 在 2024 年 12 月的 Wear OS 安全性公告中,我們未提供任何 Wear OS 安全性修補程式。
常見問題與解答
如果您在閱讀這篇公告後有任何疑問,可參考本節的常見問答。
1. 如何判斷我目前的裝置軟體版本是否已修正這些問題?
請參閱 Google 裝置更新時間表中的操作說明,瞭解如何查看裝置的安全性修補程式等級。
- 如果是 2024-12-01 之後的安全性修補程式等級,代表 2024-12-01 安全性修補程式等級涵蓋的所有問題都已解決。
提供這些更新的裝置製造商應將修補程式字串等級設定為:
- [ro.build.version.security_patch]:[2024-12-01]
如果是搭載 Android 10 以上版本的裝置,Google Play 系統更新的日期字串應與 2024-12-01 安全性修補程式等級相同。如要進一步瞭解如何安裝安全性更新,請參閱這篇文章。
2. 「類型」欄中的項目代表什麼意義?
在安全漏洞詳情表中,「類型」欄中的項目代表安全漏洞類別。
縮寫 |
定義 |
RCE |
遠端程式碼執行 |
EoP |
權限提升 |
ID |
資訊外洩 |
DoS |
阻斷攻擊 |
不適用 |
未分類 |
3. 「參考資料」欄中的項目代表什麼意義?
在安全漏洞詳情表中,「參考資料」欄底下的項目可能會包含一個前置字串,表示該參考資料值所屬的機構。
前置字串 |
參考資料 |
A- |
Android 錯誤 ID |
QC- |
Qualcomm 參考編號 |
M- |
MediaTek 參考編號 |
N- |
NVIDIA 參考編號 |
B- |
Broadcom 參考編號 |
U- |
UNISOC 參考編號 |
4. 在「參考資料」欄中,Android 錯誤 ID 旁邊的星號 (*) 代表什麼意義?
在對應的參考資料 ID 旁邊標上星號 (*) 代表該問題並未公開,相關更新通常已納入 Pixel 裝置的最新二進位驅動程式中。您可以前往 Google Developers 網站下載這些驅動程式。
5. 為什麼安全漏洞會分別刊載在這份安全性公告和裝置/合作夥伴安全性公告 (例如 Pixel 公告)?
刊載在此安全性公告的安全漏洞,都是宣告 Android 裝置最新安全性修補程式等級時,必須修正的問題。但裝置/合作夥伴安全性公告所刊載的其他安全漏洞,對於宣告安全性修補程式等級並非必要。Android 裝置和晶片組製造商也可能會針對該公司的產品發布安全漏洞詳細資料,例如:Google、Huawei、LGE、Motorola、Nokia 或 Samsung。
版本
版本 |
日期 |
附註 |
1.0 |
2024 年 12 月 2 日 |
發布公告。 |
這個頁面中的內容和程式碼範例均受《內容授權》中的授權所規範。Java 與 OpenJDK 是 Oracle 和/或其關係企業的商標或註冊商標。
上次更新時間:2025-08-11 (世界標準時間)。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["缺少我需要的資訊","missingTheInformationINeed","thumb-down"],["過於複雜/步驟過多","tooComplicatedTooManySteps","thumb-down"],["過時","outOfDate","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["示例/程式碼問題","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-08-11 (世界標準時間)。"],[],[],null,["# Wear OS Security Bulletin—December 2024\n\n*Published December 2, 2024*\n\n\nThe Wear OS Security Bulletin contains details of security\nvulnerabilities affecting the Wear OS platform.\nThe full Wear OS update comprises the security patch level\nof 2024-12-05 or later from the\n[December 2024 Android Security Bulletin](/security/bulletin/2024-12-01)\nin addition to all issues in this bulletin.\n\n\nWe encourage all customers to accept these updates to their devices.\n| **Note**: Please contact your device supplier for device firmware images.\n\n\nThe most severe of these issues is a high security vulnerability in\nthe System component that could lead to local escalation of privilege\nwith no additional execution privileges needed.\nThe [severity assessment](/security/overview/updates-resources#severity) is based on the effect that exploiting\nthe vulnerability would possibly have on an affected device, assuming the\nplatform and service mitigations are turned off for development purposes\nor if successfully bypassed.\n\nAnnouncements\n-------------\n\n- There are no Wear OS security patches in the December 2024 Wear OS Security Bulletin.\n\nCommon questions and answers\n----------------------------\n\nThis section answers common questions that may occur after reading this\nbulletin.\n\n**1. How do I determine if my device is updated to address these\nissues?**\n\nTo learn how to check a device's security patch level, read the instructions on the\n[Google device update schedule](https://support.google.com/android/answer/7680439).\n\n- Security patch levels of 2024-12-01 or later address all issues associated with the 2024-12-01 security patch level.\n\nDevice manufacturers that include these updates should set the patch string level to:\n\n- \\[ro.build.version.security_patch\\]:\\[2024-12-01\\]\n\nFor some devices on Android 10 or later, the Google Play system update\nwill have a date string that matches the 2024-12-01\nsecurity patch level.\nPlease see [this article](https://support.google.com/android/answer/7680439?hl=en) for more details on how to install\nsecurity updates.\n\n\n**2. What do the entries in the *Type* column mean?**\n\nEntries in the *Type* column of the vulnerability details table\nreference the classification of the security vulnerability.\n\n| Abbreviation | Definition |\n|--------------|------------------------------|\n| RCE | Remote code execution |\n| EoP | Elevation of privilege |\n| ID | Information disclosure |\n| DoS | Denial of service |\n| N/A | Classification not available |\n\n\n**3. What do the entries in the *References* column mean?**\n\nEntries under the *References* column of the vulnerability details\ntable may contain a prefix identifying the organization to which the reference\nvalue belongs.\n\n| Prefix | Reference |\n|--------|---------------------------|\n| A- | Android bug ID |\n| QC- | Qualcomm reference number |\n| M- | MediaTek reference number |\n| N- | NVIDIA reference number |\n| B- | Broadcom reference number |\n| U- | UNISOC reference number |\n\n\n**4. What does an \\* next to the Android bug ID in the *References*\ncolumn mean?**\n\nIssues that are not publicly available have an \\* next to the corresponding\nreference ID. The update for that issue is generally contained in the latest\nbinary drivers for Pixel devices available from the\n[Google Developer site](https://developers.google.com/android/drivers).\n\n**5. Why are security vulnerabilities split between this bulletin and\ndevice / partner security bulletins, such as the\nPixel bulletin?**\n\nSecurity vulnerabilities that are documented in this security bulletin are\nrequired to declare the latest security patch level on Android\ndevices. Additional security vulnerabilities that are documented in the\ndevice / partner security bulletins are not required for\ndeclaring a security patch level. Android device and chipset manufacturers\nmay also publish security vulnerability details specific to their products,\nsuch as\n[Google](/security/bulletin/pixel),\n[Huawei](https://consumer.huawei.com/en/support/bulletin/),\n[LGE](https://lgsecurity.lge.com/security_updates_mobile.html),\n[Motorola](https://motorola-global-portal.custhelp.com/app/software-security-page/g_id/6806),\n[Nokia](https://www.nokia.com/phones/en_int/security-updates), or\n[Samsung](https://security.samsungmobile.com/securityUpdate.smsb).\n\nVersions\n--------\n\n| Version | Date | Notes |\n|---------|------------------|---------------------|\n| 1.0 | December 2, 2024 | Bulletin Published. |"]]