This Release Notes document is for the RealWear HMT-1 firmware release 11.1, a security patch release with additional feature updates.
The release is only applicable to the HMT-1 standard model. Any HMT-1 ever sold by RealWear may update to this release (although earlier updates may need to be installed before 11.0.0 can be installed.). Full product brief authored by our product manager is here.
1.1 Deliverables
Delivery Data | |
Company | RealWear Inc. |
Model Number | HMT-1 (T1100G) |
Firmware Version | 11.1 |
Build File Name | 11.1.0-10-C.HMT-1.G |
Release notes are only a summary of what’s new in this release. For more detailed information on using the features, consult the comprehensive documentation in RealWear’s Knowledge Center linked below in each section of the release notes.
2.1.1 My Files
RealWear’s My Files application has always been great for viewing files hands-free with access to My Media, My Documents and My Photos. With Release 11.1 users will now have the ability to browse:
Relevant Knowledge Center Pages:
2.1.2 Photo Tagging
Photos that are captured in RealWear’s My Camera application can now quickly and easily be tagged with one or multiple tags. Photo tagging is particularly useful in inspection or audit use cases where organizing and extracting value from many photos and videos is challenging.
Relevant Knowledge Center Pages:
2.1.4 Web Apps
A new application that enables users to access a shortlist of Web Pages and applications such as predefined bookmarks or web based applications purpose built for the RealWear platform.
Relevant Knowledge Center Pages:
2.2.1 My Files
RealWear’s My Files now implements the Android standard Storage Access Framework. In the linked Google documentation, under “Writing a client app” you’ll see that by invoking standard intents, you’ll be able to access RealWear’s My Files for required actions programatically.
2.2.2 Document Viewer & Media Player:
RealWear’s Document Viewer and Media Player now support remote URI’s via their existing intents without any additional work required by the application developer.
2.2.3 Photo Tagging
Using the RealWear My Camera intent and tagging service, tags are kept as meta data in the EXIF, meaning they are persistent with files and images.
2.2.4 Web Page Viewer
Behind the scenes of RealWear’s Web Apps application is the Web Page Viewer called via intent.
2.2.5 Audio Recorder
RealWear’s Audio Recorder can be called programmatically by other applications.
Relevant Knowledge Center Pages:
2.2.6 File Annotation
A new application that enables a user to annotate a picture with arrows, boxes and circles that can be white or red from a RealWear device. This is particularly useful for providing a simple annotation experience from a RealWear device.
In Release 11.1, this application can only be launched by a 3rd party application via an intent.
2.2.7 Web Kit
Applications that use the WebView component can now install and update Google’s version of WebView. This gives developers and users the ability to continually upgrade the version of WebView & WebKit without needing a RealWear firmware update.
2.2.8 WearML Indicators
One of the most powerful features of RealWear’s software platform is the ability to place any Android application onto a RealWear device and have that application be voice enabled with no effort required by automatically mapping speech bubbles, known as WearML indicators, over items on a RealWear screen to indicate that the item is clickable. These WearML indicators can be triggered either by saying that voice command or by saying “select item x” for example “select item 4”. This no code approach to voice enabling apps has been taken to the next level in Release 11.1. Now in My Controls, users can control how long WearML Indicators appear on the screen before they fade away.
Options available are:
This functionality for a specific app can also be controlled programmatically by developers.
2.3.1 Head-Tracking mouse
RealWear’s head tracking mouse, available as an option from My Controls, has been significantly improved. This improved mouse can be used system wide and is leveraged in the Web Apps application and any other time the RealWear Web Page Viewer is used.
Relevant Knowledge Center Pages:
2.3.2 Keyboard
Replaced close keyboard voice command with navigate back
Relevant Knowledge Center Pages:
2.3.3 Audio Recorder Application
RealWear’s Audio Recorder application enables users to record audio using the microphones of their RealWear device.
Relevant Knowledge Center Pages:
2.4.1 Full language support for Indonesian
Relevant Knowledge Center Pages:
2.4.2 Cloud dictation support for the Great Britain, Australia and India dialects of English language
Relevant Knowledge Center Pages:
2.5.1 Android Security Updates
Security updates released through the end of February 2020 are incorporated into this release. See the full list of updates in the appendix of these release notes.
2.6.1 “android.software.managed_users Declaration”
# | Summary |
49435 | HMT serial number is not displayed on System under MTP properties |
49420 | [Release 11] Date should be changed to Jan 1, 2020 |
49417 | [Release 11]-Mic Sensitivity during Noise capture mode is low – Loudness of Recorded voice is too low compared with MR2.2 |
49300 | Auto-focus is slow/sometimes never functions correctly |
49147 | After Hotswap with low battery, Device comes up with “Android is starting” and Reboots continously |
48784 | [LTE Modem] Wireless Network(Wi-Fi) doesn’t get connected when LTE dongle is plugged in and connected. |
2.9 Known Issues
Key | Status | Summary |
WEB-75 | Backlog | Scan Bookmark – Set Playback timer for audio / video file is not working. Media file always starts from beginning |
HMT-4278 | New | Head tracking is sometimes failing |
HMT-4191 | Need More Info | [Tagging Service] Unable to set Tags for non JPG format images files |
HMT-4184 | To Do | [MyFiles] – Unable to select item #20 in MyMedia – happens with only 1 set of files |
HMT-4182 | To Do | [Audio Recorder] Same UI icon shown for all options in More options |
HMT-4172 | Fix Not Feasible | [Tagging Service] Unable to see all tags list from Manage tags |
HMT-4169 | To Do | [Web Apps] More options window and keyboard window over laps the UI screen |
HMT-4155 | In Progress | [Media Player]: Deleted Audio file from Preview is visible in MTP folder. |
HMT-4154 | New | [Tagging Service] “tagset.json download failed” toast message is shown when SD card is set as storage mode. |
HMT-4147 | To Do | [My Files] Files like audio,video,images and pdf opened from My Drives Folder are not shown in Recent Files. |
HMT-4099 | To Do | Audio Recorder : Filename toast is not shown when recording is stopped |
HMT-4098 | New | [Tagging] Tagging fails to set pictures stored or captured in SD Card/External Storage |
HMT-4063 | To Do | Insert SD card, pull down the status bar, SD card related options doesn’t work |
HMT-4059 | To Do | Content in Realwear Companion app on bootup is not translated – after scanning QR code |
HMT-4056 | To Do | AE Enrollment Failed – If apps are installed on HMT pushed via Foresight |
HMT-4043 | To Do | Low Battery Notificaiton is not prompted after performing HMT reboot (from Power Options) |
HMT-4042 | To Do | Barcode reader app freezes upon repeatedly pressing Power key |
HMT-4023 | To Do | Webpage loading indication is not indicated to user in Web Apps. |
HMT-3999 | To Do | Developer Test app – Speech Recognizer and BNF Grammer option is crashing |
19 issues
NOTE – Noise Capture Feature for 3rd Party Apps are for demo only and below issues are known on MR3.1
# | Subject |
51452 | [MS Teams] Call audio is not heard as soon call is connected (observed when Noise is more than 86dB) |
51450 | [Oculavis Share] User Voice on Call is not audible clearly as soon as the call is accepted (happens when noise is at 90dB only) |
51443 | [Zoom] When we enable noise capture during call, no noise is heard |
51442 | [Expert on Demand] Noise cancellation is not working when the call is initiated |
51441 | [MS Teams] Background noise is heard after disabling Noise capture during call. (observed when Noise is more than 86dB) |
51174 | Onsight Application – When we enable noise capture during call, there is no difference in the noise heard |
Major.Minor.Patch MAJOR – increments when we make incompatible BSP changes,
MINOR – Increment for every Maintenance Release
PATCH – 0 for HMT1 , 1 for HMT-1Z1 & 2 for Picard
For Every Maintenance release – we just increment the Minor number and keep the Patch constant for the product
Product MR3 MR3.1 MR3.2 MR3.X
HMT1 11.0.0 11.1.0 11,2.0 11.X.0
HMT-1Z1 11.1.0 11.1.1 11.2.1 11.X.1
HMT1 (Picard) 11.2.0 11.X.2
XX – Build Information will start will 01 for the first internal release from SIMT and would be incremented as per the build sequence
NOTE – If there is no change between Generic device and IS – Build Information should remain same
Framework
CVE | References | RealWear Update |
CVE-2019-2173 | A-123013720 | N/A to RealWear kernel version |
Media Framework
CVE | References | RealWear Update |
CVE-2019-2184 | A-134578122 | Included |
CVE-2019-2185 | A-136173699 | Included |
CVE-2019-2186 | A-136175447 | Included |
CVE-2019-2110 | A-69703445 [2] | N/A to RealWear kernel version |
System
CVE | References | RealWear Update |
CVE-2019-2114 | A-123700348 | N/A to RealWear kernel version |
CVE-2019-2114 | A-123700348 [2] | Included |
CVE-2019-2187 | A-124940143 | N/A to RealWear kernel version |
Kernel Components
CVE | References | RealWear Update |
CVE-2018-19824 | A-120783587 Upstream kernel | N/A to RealWear kernel version |
CVE-2019-2215 | A-141720095 | N/A to RealWear kernel version |
Qualcomm Components
CVE | References | RealWear Update |
CVE-2019-2268 | A-127512519 QC-CR#2263727 QC-CR#2429210 | N/A to RealWear kernel version |
CVE-2019-10535 | A-136501752 QC-CR#2308644 | N/A to RealWear kernel version |
CVE-2018-11902 | A-136498768 QC-CR#2278457 | N/A to RealWear kernel version |
Qualcomm closed-source components
CVE | References | RealWear Update |
CVE-2018-13916 | A-122473303* | N/A to RealWear kernel version |
CVE-2019-2251 | A-122474427* | N/A to RealWear kernel version |
CVE-2019-2271 | A-129766175* | Included |
CVE-2019-2289 | A-129765090* | Included |
CVE-2019-2315 | A-129766098* | Included |
CVE-2019-2329 | A-129766136* | Included |
CVE-2019-2336 | A-129766497* | N/A to RealWear kernel version |
CVE-2019-2339 | A-129765860* | N/A to RealWear kernel version |
CVE-2019-2271 | A-129765571* | Included |
CVE-2019-2303 | A-129765728* | Included |
CVE-2019-2318 | A-129766832* | N/A to RealWear kernel version |
CVE-2019-2335 | A-129766932* | Included |
CVE-2019-10490 | A-132108421* | N/A to RealWear kernel version |
CVE-2019-2295 | A-132108893* | N/A to RealWear kernel version |
CVE-2019-10513 | A-134437225* | Included |
Framework
CVE | References | RealWear Update |
CVE-2019-2192 | A-138441555 | N/A to RealWear kernel version |
CVE-2019-2193 | A-132261064 [2] | Included |
CVE-2019-2195 | A-139186193 | Included |
CVE-2019-2199 | A-138650665 | N/A to RealWear kernel version |
CVE-2019-2211 | A-135269669 [2] | Included |
CVE-2019-2197 | A-138529441 | Included |
Library
CVE | References | RealWear Update |
CVE-2019-2201 | A-120551338 | N/A to RealWear kernel version |
Media Framework
CVE | References | RealWear Update |
CVE-2019-2202 | A-137283376 | N/A to RealWear kernel version |
CVE-2019-2203 | A-137370777 | Included |
System
CVE | References | RealWear Update |
CVE-2019-2204 | A-138442295 | N/A to RealWear kernel version |
CVE-2019-2205 | A-139806216 | Included |
CVE-2019-2206 | A-139188579 | N/A to RealWear kernel version |
CVE-2019-2233 | A-140486529 | N/A to RealWear kernel version |
CVE-2019-2207 | A-124524315 | N/A to RealWear kernel version |
CVE-2019-2212 | A-139690488 [2] [3] | N/A to RealWear kernel version |
CVE-2019-2208 | A-138441919 | N/A to RealWear kernel version |
CVE-2019-2209 | A-139287605 | N/A to RealWear kernel version |
Framework
CVE | References | RealWear Update |
CVE-2019-2196 | A-135269143 [2] [3] [4] | N/A to RealWear kernel version |
CVE-2019-2198 | A-135270103 [2] [3] [4] | N/A to RealWear kernel version |
System
CVE | References | RealWear Update |
CVE-2019-2036 | A-79703832 | Included |
Kernel Components
CVE | References | RealWear Update |
CVE-2019-2213 | A-133758011 Upstream kernel | Included |
CVE-2019-2214 | A-136210786 Upstream kernel | Included |
CVE-2019-2215 | A-141720095 Upstream kernel | Included |
CVE-2019-11833 | A-133041647 Upstream kernel | Included |
Qualcomm Components
CVE | References | RealWear Update |
CVE-2019-2310 | A-78906648 QC-CR#2253243 | N/A to RealWear kernel version |
CVE-2019-10545 | A-138940225 QC-CR#2353418 | N/A to RealWear kernel version |
CVE-2019-10571 | A-138940226 QC-CR#2363085 | Included |
Qualcomm closed-source components
CVE | References | RealWear Update |
CVE-2019-10493 | A-132108736* | Included |
CVE-2019-10511 | A-132097484* | N/A to RealWear kernel version |
CVE-2019-2288 | A-132108853* | Included |
CVE-2019-2320 | A-132108539* | Included |
CVE-2019-2321 | A-132108927* | Included |
CVE-2019-10484 | A-132108752* | N/A to RealWear kernel version |
CVE-2019-10485 | A-132108463* | Included |
CVE-2019-2319 | A-132107963* | N/A to RealWear kernel version |
CVE-2019-2337 | A-132108895* | Included |
CVE-2019-2338 | A-132108464* | N/A to RealWear kernel version |
CVE-2019-10559 | A-137030660* | N/A to RealWear kernel version |
Framework
CVE | References | RealWear Update |
CVE-2019-2232 | A-140632678 | N/A to RealWear kernel version |
CVE-2019-9464 | A-141028068 [2] [3] [4] | N/A to RealWear kernel version |
CVE-2019-2217 | A-141003796 | N/A to RealWear kernel version |
CVE-2019-2218 | A-141169173 | N/A to RealWear kernel version |
CVE-2019-2220 | A-138636979 [2] | N/A to RealWear kernel version |
CVE-2019-2221 | A-138583650 [2] | N/A to RealWear kernel version |
Media Framework
CVE | References | RealWear Update |
CVE-2019-2222 | A-140322595 | N/A to RealWear kernel version |
CVE-2019-2222 | A-140322595 | Included |
CVE-2019-2223 | A-140692129 | N/A to RealWear kernel version |
CVE-2019-2223 | A-140692129 | Included |
System
CVE | References | RealWear Update |
CVE-2019-2224 | A-140328986 | Included |
CVE-2019-2225 | A-110433804 [2] | Included |
CVE-2019-2226 | A-140152619 | Included |
CVE-2019-2227 | A-140768453 | N/A to RealWear kernel version |
CVE-2019-2228 | A-111210196 [2] | [1]Included [2]Included |
CVE-2019-2229 | A-139803872 [2] | Included |
CVE-2019-2230 | A-141170038 | N/A to RealWear kernel version |
CVE-2019-2231 | A-140328986 | N/A to RealWear kernel version |
Kernel Components
CVE | References | RealWear Update |
CVE-2018-20961 | A-139522588 Upstream kernel | Included |
CVE-2019-15220 | A-140329469 Upstream kernel | Included |
CVE-2019-15239 | A-140328996 Upstream kernel | Included |
Qualcomm Components
CVE | References | RealWear Update |
CVE-2019-10557 | A-78657016 QC-CR#2255369 QC-CR#2259707 | N/A to RealWear kernel version |
CVE-2018-11980 | A-140423440 QC-CR#2270117 | N/A to RealWear kernel version |
CVE-2019-10480 | A-140423811 QC-CR#2309399 | N/A to RealWear kernel version |
CVE-2019-10481 | A-140423794 QC-CR#2304610 QC-CR#2318632 | N/A to RealWear kernel version |
CVE-2019-10536 | A-140423334 QC-CR#2433802 | N/A to RealWear kernel version |
CVE-2019-10537 | A-140423693 QC-CR#2436502 | N/A to RealWear kernel version |
CVE-2019-10595 | A-140423810 QC-CR#2148184 | N/A to RealWear kernel version |
CVE-2019-10598 | A-140423155 QC-CR#2324139 | N/A to RealWear kernel version |
CVE-2019-10601 | A-140423156 QC-CR#2428798 | N/A to RealWear kernel version |
CVE-2019-10605 | A-140424124 QC-CR#2187441 | N/A to RealWear kernel version |
CVE-2019-10607 | A-140423690 QC-CR#2211711 | Included |
CVE-2019-2304 | A-123238115 QC-CR#2331868 QC-CR#2335530 QC-CR#2348299 QC-CR#2203904* | N/A to RealWear kernel version |
Qualcomm closed-source components
CVE | References | RealWear Update |
CVE-2019-2242 | A-123998200* | N/A to RealWear kernel version |
CVE-2019-10500 | A-134437248* | Included |
CVE-2019-10525 | A-134437319* | Included |
CVE-2019-10482 | A-132108950* | Included |
CVE-2019-10487 | A-134437030* | Included |
CVE-2019-10516 | A-134437075* | Included |
CVE-2019-2274 | A-134437362* | N/A to RealWear kernel version |
CVE-2019-10513 | A-134437225* | Included |
CVE-2019-10517 | A-140424724* | N/A to RealWear kernel version |
CVE-2019-10600 | A-140424089* | N/A to RealWear kernel version |
Framework
CVE | References | RealWear Update |
CVE-2020-0001 | A-140055304 | N/A to RealWear kernel version |
CVE-2020-0003 | A-140195904 | N/A to RealWear kernel version |
CVE-2020-0004 | A-120847476 | N/A to RealWear kernel version |
Media Framework
CVE | References | RealWear Update |
CVE-2020-0002 | A-142602711 | Included |
System
CVE | References | RealWear Update |
CVE-2020-0006 | A-139738828 | N/A to RealWear kernel version |
CVE-2020-0007 | A-141890807 [2] | Included |
CVE-2020-0008 | A-142558228 | Included |
Kernel Components
CVE | References | RealWear Update |
CVE-2019-17666 | A-142967706 Upstream kernel | N/A to RealWear kernel version |
CVE-2018-20856 | A-138921316 Upstream kernel | N/A to RealWear kernel version |
CVE-2019-15214 | A-140920734 Upstream kernel | N/A to RealWear kernel version |
CVE-2020-0009 | A-142938932* | N/A to RealWear kernel version |
Qualcomm Components
CVE | References | RealWear Update |
CVE-2018-11843 | A-111126051 QC-CR#2216751 | N/A to RealWear kernel version |
CVE-2019-10558 | A-142268223 QC-CR#2355428 | N/A to RealWear kernel version |
CVE-2019-10581 | A-142267478 QC-CR#2451619 | Included |
CVE-2019-10585 | A-142267685 QC-CR#2457975 | Included |
CVE-2019-10602 | A-142270161 QC-CR#2165926 [2] | N/A to RealWear kernel version |
CVE-2019-10606 | A-142269492 QC-CR#2192810 [2] | Included |
CVE-2019-14010 | A-142269847 QC-CR#2465851 [2] | N/A to RealWear kernel version |
CVE-2019-14023 | A-142270139 QC-CR#2493328 | N/A to RealWear kernel version |
CVE-2019-14024 | A-142269993 QC-CR#2494103 | N/A to RealWear kernel version |
CVE-2019-14034 | A-142270258 QC-CR#2491649 [2] [3] | N/A to RealWear kernel version |
CVE-2019-14036 | A-142269832 QC-CR#2200862 | N/A to RealWear kernel version |
Qualcomm closed-source components
CVE | References | RealWear Update |
CVE-2019-2267 | A-132108182* | N/A to RealWear kernel version |
CVE-2019-10548 | A-137030896* | Included |
CVE-2019-10532 | A-142271634* | N/A to RealWear kernel version |
CVE-2019-10578 | A-142268949* | N/A to RealWear kernel version |
CVE-2019-10579 | A-142271692* | N/A to RealWear kernel version |
CVE-2019-10582 | A-130574302* | N/A to RealWear kernel version |
CVE-2019-10583 | A-131180394* | N/A to RealWear kernel version |
CVE-2019-10611 | A-142271615* | N/A to RealWear kernel version |
CVE-2019-14002 | A-142271274* | N/A to RealWear kernel version |
CVE-2019-14003 | A-142271498* | N/A to RealWear kernel version |
CVE-2019-14004 | A-142271848* | N/A to RealWear kernel version |
CVE-2019-14005 | A-142271965* | N/A to RealWear kernel version |
CVE-2019-14006 | A-142271827* | N/A to RealWear kernel version |
CVE-2019-14008 | A-142271609* | N/A to RealWear kernel version |
CVE-2019-14013 | A-142271944* | N/A to RealWear kernel version |
CVE-2019-14014 | A-142270349* | N/A to RealWear kernel version |
CVE-2019-14016 | A-142270646* | N/A to RealWear kernel version |
CVE-2019-14017 | A-142271515* | N/A to RealWear kernel version |
Framework
CVE | References | RealWear Update |
CVE-2020-0014 | A-128674520 | N/A to RealWear kernel version |
CVE-2020-0015 | A-139017101 | Included |
CVE-2019-2200 | A-67319274 | N/A to RealWear kernel version |
CVE-2020-0017 | A-123232892 [2] | N/A to RealWear kernel version |
CVE-2020-0018 | A-139945049 | N/A to RealWear kernel version |
CVE-2020-0020 | A-143118731 | N/A to RealWear kernel version |
CVE-2020-0021 | A-141413692 [2] [3] | N/A to RealWear kernel version |
Media Framework
CVE | References | RealWear Update |
CVE-2020-0022 | A-143894715 | Included |
CVE-2020-0023 | A-145130871 | N/A to RealWear kernel version |
CVE-2020-0005 | A-141552859 | Included |
CVE-2020-0026 | A-140419401 | Included |
CVE-2020-0027 | A-144040966 | Included |
CVE-2020-0028 | A-122652057 [2] | N/A to RealWear kernel version |
System
CVE | References | RealWear Update |
CVE-2019-2114 | A-123700348 | N/A to RealWear kernel version |
CVE-2019-2114 | A-123700348 [2] | Included |
CVE-2019-2187 | A-124940143 | N/A to RealWear kernel version |
Kernel Components
CVE | References | RealWear Update |
CVE-2020-0030 | A-145286050 Upstream kernel | N/A to RealWear kernel version |
CVE-2019-11599 | A-131964235 Upstream kernel [2] | N/A to RealWear kernel version |
Qualcomm Components
CVE | References | RealWear Update |
CVE-2019-14044 | A-143903491 QC-CR#2175394 | N/A to RealWear kernel version |
CVE-2019-14046 | A-143902999 QC-CR#2207235 | Included |
CVE-2019-14049 | A-143903513 QC-CR#2305531 [2] [3] | Included |
CVE-2019-14055 | A-143902876 QC-CR#2352487 | Included |
CVE-2019-14063 | A-143901127 QC-CR#2491577 | N/A to RealWear kernel version |
CVE-2019-10567 | A-140246780 QC-CR#2520860 [2] [3] | N/A to RealWear kernel version |
Qualcomm closed-source components
CVE | References | RealWear Update |
CVE-2019-10590 | A-143903858* | N/A to RealWear kernel version |
CVE-2019-14051 | A-143902841* | N/A to RealWear kernel version |
CVE-2019-14057 | A-143903018* | N/A to RealWear kernel version |
CVE-2019-14060 | A-143903752* | N/A to RealWear kernel version |