This Release Notes document is for the RealWear firmware release 12.0, update to Android 10.0 with security patch release and additional feature updates. Any HMT-1 or HMT-1Z1 ever sold by RealWear may update to this release (although earlier updates may need to be installed before 12.0.0 can be installed.)
For more details on this release not included in this article, see Release 12 Product Brief.
Delivery Data | |
Company | RealWear Inc. |
Model Number | HMT-1 (T1100G), HMT-1Z1 (T1100S) |
Firmware Version | 12.0 |
Build File Name | HMT-1: 12.0.0-12-C.HMT-1.G or 12.0.2-12-C.HMT-1.G HMT-1Z1: TBD |
Release notes are only a summary of what’s new in this release. For more detailed information on using the features, consult the comprehensive documentation in RealWear’s Knowledge Center linked below in each section of the release notes.
Bug fixes and improvements have been made for this release. Details on specific fixes are available upon request via RealWear support.
Components | CVE | References | Status | Comments |
Framework | CVE-2020-0074 | A-146204120 [2] | Included | |
CVE-2020-0388 | A-156123285 | Included | ||
CVE-2020-0391 | A-158570769 | Included | ||
CVE-2020-0401 | A-150857253 | No | N/A to RealWear kernel version | |
CVE-2020-0382 | A-152944488 [2] | Included | ||
CVE-2020-0389 | A-156959408 | Included | ||
CVE-2020-0390 | A-157598026 | Included | ||
CVE-2020-0395 | A-154124307 [2] | Included | ||
CVE-2020-0397 | A-155092443 [2] | Included | ||
CVE-2020-0399 | A-153993591 [2] [3] | Included | ||
Media Framework | CVE-2020-0245 | A-152496149 | Included | |
CVE-2020-0392 | A-150226608 | No | N/A to RealWear kernel version | |
CVE-2020-0381 | A-150159669 | Included | ||
CVE-2020-0383 | A-150160279 | Included | ||
CVE-2020-0384 | A-150159906 | Included | ||
CVE-2020-0385 | A-150160041 | Included | ||
CVE-2020-0393 | A-154123412 | Included | ||
System | CVE-2020-0380 | A-146398979 | Included | |
CVE-2020-0396 | A-155094269 [2] [3] [4] [5] [6] [7] [8] [9] | No | N/A to RealWear kernel version | |
CVE-2020-0386 | A-155650356 | No | N/A to RealWear kernel version | |
CVE-2020-0394 | A-155648639 | No | N/A to RealWear kernel version | |
CVE-2020-0379 | A-150156492 | Included | ||
Kernel | CVE-2019-19769 | A-150693748 Upstream kernel [2] | No | N/A to RealWear kernel version |
CVE-2020-0404 | A-111893654 Upstream kernel | No | N/A to RealWear kernel version | |
CVE-2020-0407 | A-153450752* | No | N/A to RealWear kernel version | |
MediaTek components | CVE-2020-0123 | A-149871374 DTV02098055* | No | N/A Qualcomm Baseline |
CVE-2020-0229 | A-156333725 ALPS05023182* | No | N/A Qualcomm Baseline | |
CVE-2020-0278 | A-160812574 ALPS05132252 * | No | N/A Qualcomm Baseline | |
CVE-2020-0342 | A-160812576 ALPS05132765* | No | N/A Qualcomm Baseline | |
Qualcomm components | CVE-2019-10527 | A-147102899 QC-CR#2421611 QC-CR#2421602 [2] QC-CR#2419153* | Included | |
CVE-2019-14117 | A-147104886 QC-CR#2525999 | No | N/A Qualcomm Baseline | |
CVE-2020-3613 | A-148816706 QC-CR#2239987 | No | N/A Qualcomm Baseline | |
CVE-2020-3656 | A-157905780 QC-CR#2580967 | No | N/A Qualcomm Baseline | |
CVE-2020-11124 | A-157906588 QC-CR#2611487 | No | N/A Qualcomm Baseline | |
Qualcomm closed-source components | CVE-2019-10628 | A-147102780* | Included | |
CVE-2019-10629 | A-147101658* | Included | ||
CVE-2019-13994 | A-147104051* | Included | ||
CVE-2020-3621 | A-148816726* | Included | ||
CVE-2020-3634 | A-150695049* | No | N/A to RealWear kernel version | |
CVE-2019-10596 | A-147104369* | Included | ||
CVE-2019-13992 | A-147102898* | Included | ||
CVE-2019-13995 | A-147104253* | Included | ||
CVE-2019-14074 | A-145546792* | Included | ||
CVE-2020-3617 | A-150697774* | No | N/A to RealWear kernel version | |
CVE-2020-3620 | A-148817068* | Included | ||
CVE-2020-3622 | A-148817285* | Included | ||
CVE-2020-3629 | A-148816991* | Included | ||
CVE-2020-3671 | A-148529608* | Included | ||
CVE-2020-11129 | A-157905420* | No | N/A to RealWear kernel version | |
CVE-2020-11133 | A-157905987* | Included | ||
CVE-2020-11135 | A-157906313* | No | N/A to RealWear kernel version |
Components | CVE | References | Status | Comments |
Android runtime | CVE-2020-0408 | A-156999009 | Included | |
Framework | CVE-2020-0420 | A-162383705 | No | N/A for Android 10 |
CVE-2020-0421 | A-161894517 | Included | ||
CVE-2020-0246 | A-159062405 | Included | ||
CVE-2020-0412 | A-160390416 | Included | ||
CVE-2020-0419 | A-142125338 | Included | ||
Media Framework | CVE-2020-0213 | A-143464314 | Included | |
CVE-2020-0411 | A-142641801 | Included | ||
CVE-2020-0414 | A-157708122 | Included | ||
CVE-2019-2194 | A-137284057 | No | N/A for Android 10 | |
System | CVE-2020-0215 | A-140417248 [2] | Included | |
CVE-2020-0416 | A-155288585 [2] | No | N/A to RealWear kernel version | |
CVE-2020-0377 | A-158833854 | Included | ||
CVE-2020-0378 | A-157748906 | Included | ||
CVE-2020-0398 | A-154323381 | Included | ||
CVE-2020-0400 | A-153356561 | Included | ||
CVE-2020-0410 | A-156021269 | Included | ||
CVE-2020-0413 | A-158778659 | Included | ||
CVE-2020-0415 | A-156020795 | No | N/A to RealWear kernel version | |
CVE-2020-0422 | A-161718556 | Included | ||
Kernel | CVE-2020-0423 | A-161151868* | No | N/A to RealWear kernel version |
MediaTek components | CVE-2020-0283 | A-163008257 M-ALPS05229282* | No | N/A to RealWear kernel version |
CVE-2020-0339 | A-162980705 M-ALPS05194445* | No | N/A Qualcomm Baseline | |
CVE-2020-0367 | A-162980455 M-ALPS05194445* | No | N/A Qualcomm Baseline | |
CVE-2020-0371 | A-163008256 M-ALPS05229226* | No | N/A Qualcomm Baseline | |
CVE-2020-0376 | A-163003156 M-ALPS05194415* | No | N/A Qualcomm Baseline | |
Qualcomm components | CVE-2020-11125 | A-160605820 QC-CR#2617422 QC-CR#2673763 | No | N/A to RealWear kernel version |
CVE-2020-11162 | A-160605604 QC-CR#2677376 | No | N/A to RealWear kernel version | |
CVE-2020-11173 | A-160605709 QC-CR#2646001 | No | N/A to RealWear kernel version | |
CVE-2020-11174 | A-160605900 QC-CR#2636449 | Included | ||
Qualcomm closed-source components | CVE-2020-3654 | A-153346045* | No | N/A to RealWear kernel version |
CVE-2020-3657 | A-153344684* | No | N/A to RealWear kernel version | |
CVE-2020-3673 | A-153345154* | No | N/A to RealWear kernel version | |
CVE-2020-3692 | A-153345116* | No | N/A to RealWear kernel version | |
CVE-2020-11154 | A-160605708* | No | N/A to RealWear kernel version | |
CVE-2020-11155 | A-160605404* | No | N/A to RealWear kernel version | |
CVE-2020-3638 | A-153346253* | No | N/A to RealWear kernel version | |
CVE-2020-3670 | A-153345118* | No | N/A to RealWear kernel version | |
CVE-2020-3678 | A-153345398* | No | N/A to RealWear kernel version | |
CVE-2020-3684 | A-153346047* | No | N/A to RealWear kernel version | |
CVE-2020-3690 | A-153344723* | No | N/A to RealWear kernel version | |
CVE-2020-3703 | A-160605749* | No | N/A to RealWear kernel version | |
CVE-2020-3704 | A-160605508* | No | N/A to RealWear kernel version | |
CVE-2020-11141 | A-160606016* | No | N/A to RealWear kernel version | |
CVE-2020-11156 | A-160605294* | No | N/A to RealWear kernel version | |
CVE-2020-11157 | A-160605864* | No | N/A to RealWear kernel version | |
CVE-2020-11164 | A-160605595* | No | N/A to RealWear kernel version | |
CVE-2020-11169 | A-160605405* | No | N/A to RealWear kernel version |
Components | CVE | References | Status | Comments |
Android runtime | CVE-2020-0409 | A-156997193 | Included | |
Framework | CVE-2020-0441 | A-158304295 | Included | |
CVE-2020-0442 | A-147358092 | Included | ||
CVE-2020-0418 | A-153879813 | Included | ||
CVE-2020-0439 | A-140256621 [2] | No | N/A for Qualcomm Baseline | |
CVE-2020-0454 | A-161370134 [2] | No | N/A for Android 10 | |
CVE-2020-0443 | A-152410253 | Included | ||
Media Framework | CVE-2020-0451 | A-158762825 | Included | |
CVE-2020-0452 | A-159625731 | Included | ||
CVE-2020-0438 | A-161812320 | No | N/A for Qualcomm Baseline | |
System | CVE-2020-0449 | A-162497143 | Included | |
CVE-2020-12856 | A-157038281 [2] [3] [4] | No | N/A for Qualcomm Baseline | |
CVE-2020-0424 | A-161362564 | No | N/A for Qualcomm Baseline | |
CVE-2020-0448 | A-153995334 | Included | ||
CVE-2020-0450 | A-157650336 | Included | ||
CVE-2020-0453 | A-159060474 | No | N/A for Android 10 | |
CVE-2020-0437 | A-162741784 | No | N/A for Qualcomm Baseline | |
MediaTek | CVE-2020-0445 | A-168264527 M-ALPS05253566 * | No | N/A for Qualcomm Baseline |
CVE-2020-0446 | A-168264528 M-ALPS05257259* M-ALPS05316810* | No | N/A for Qualcomm Baseline | |
CVE-2020-0447 | A-168251617 M-ALPS05287879 * | No | N/A for Qualcomm Baseline | |
Qualcomm closed-source components | CVE-2020-3639 | A-155653490 * | No | N/A to RealWear kernel version |
CVE-2020-3632 | A-155652696 * | No | N/A to RealWear kernel version | |
CVE-2020-11123 | A-155652382 * | No | N/A to RealWear kernel version | |
CVE-2020-11127 | A-155653795 * | No | N/A to RealWear kernel version | |
CVE-2020-11168 | A-162756122 * | No | N/A to RealWear kernel version | |
CVE-2020-11175 | A-162756020 * | No | N/A to RealWear kernel version | |
CVE-2020-11184 | A-162756352 * | No | N/A to RealWear kernel version | |
CVE-2020-11193 | A-162756585 * | No | N/A to RealWear kernel version | |
CVE-2020-11196 | A-162756960 * | No | N/A to RealWear kernel version | |
CVE-2020-11205 | A-162757240 * | No | N/A to RealWear kernel version |
Components | CVE Number | References | Status | Comments |
Framework | CVE-2020-0099 | A-141745510 | Included | This part of the code already exists in Kirk |
CVE-2020-0294 | A-154915372 | Included | ||
Media Framework | CVE-2020-0440 | A-162627132 [2] | No | N/A to RealWear kernel version |
CVE-2020-0459 | A-159373687 [2] [3] [4] [5] | No | N/A to RealWear kernel version | |
CVE-2020-0464 | A-150371903 [2] | Included | ||
CVE-2020-0467 | A-168500792 | Included | ||
CVE-2020-0468 | A-158484422 | No | N/A to RealWear kernel version | |
CVE-2020-0469 | A-168692734 | No | N/A to RealWear kernel version | |
CVE-2020-0458 | A-160265164 [2] | Included | This part of the code already exists in Kirk | |
CVE-2020-0470 | A-166268541 | No | N/A to RealWear kernel version | |
System | CVE-2020-0460 | A-163413737 | No | N/A to RealWear kernel version |
CVE-2020-0463 | A-169342531 | Included | ||
CVE-2020-15802 | A-158854097 | Included | ||
Kernel components | CVE-2020-0444 | A-150693166 Upstream kernel | No | N/A to RealWear kernel version |
CVE-2020-0465 | A-162844689 Upstream kernel [2] | No | N/A to RealWear kernel version | |
CVE-2020-0466 | A-147802478 Upstream kernel [2] | No | N/A to RealWear kernel version | |
Broadcom components | CVE-2020-0016 | A-171413483 * | No | N/A to RealWear kernel version |
CVE-2020-0019 | A-171413798 * | No | N/A to RealWear kernel version | |
MediaTek components | CVE-2020-0455 | A-170372514 M-ALPS05324771 * | No | N/A to RealWear kernel version |
CVE-2020-0456 | A-170378843 M-ALPS05304125 * | No | N/A to RealWear kernel version | |
CVE-2020-0457 | A-170367562 M-ALPS05304170 * | No | N/A to RealWear kernel version | |
Qualcomm components | CVE-2020-11225 | A-168050601 QC-CR#2724407 | No | N/A to RealWear kernel version |
CVE-2020-11146 | A-157906412 QC-CR#2648596 | No | N/A to RealWear kernel version | |
CVE-2020-11167 | A-168049959 QC-CR#2434229 [2] | Included | This part of the code already exists in Kirk | |
CVE-2020-11185 | A-168050580 QC-CR#2658462 | No | N/A to RealWear kernel version | |
CVE-2020-11217 | A-168051734 QC-CR#2710036 | No | N/A to RealWear kernel version | |
Qualcomm closed-source components | CVE-2020-3685 | A-157905813 * | No | N/A to RealWear kernel version |
CVE-2020-3686 | A-157906329 * | No | N/A to RealWear kernel version | |
CVE-2020-3691 | A-157906171 * | No | N/A to RealWear kernel version | |
CVE-2020-11136 | A-157905860 * | No | N/A to RealWear kernel version | |
CVE-2020-11137 | A-157905869 * | No | N/A to RealWear kernel version | |
CVE-2020-11138 | A-157905657 * | No | N/A to RealWear kernel version | |
CVE-2020-11140 | A-157906530 * | No | N/A to RealWear kernel version | |
CVE-2020-11143 | A-157905814 * | No | N/A to RealWear kernel version | |
CVE-2020-11119 | A-168051735 * | No | N/A to RealWear kernel version | |
CVE-2020-11139 | A-157905659 * | No | N/A to RealWear kernel version | |
CVE-2020-11144 | A-157906670 * | No | N/A to RealWear kernel version | |
CVE-2020-11145 | A-157905870 * | No | N/A to RealWear kernel version | |
CVE-2020-11179 | A-163548240 * | No | N/A to RealWear kernel version | |
CVE-2020-11197 | A-168050278 * | No | N/A to RealWear kernel version | |
CVE-2020-11200 | A-168049958 * | No | N/A to RealWear kernel version | |
CVE-2020-11212 | A-168050603 * | No | N/A to RealWear kernel version | |
CVE-2020-11213 | A-168050861 * | No | N/A to RealWear kernel version | |
CVE-2020-11214 | A-168049138 * | No | N/A to RealWear kernel version | |
CVE-2020-11215 | A-168049960 * | No | N/A to RealWear kernel version | |
CVE-2020-11216 | A-168050579 * | No | N/A to RealWear kernel version |
Components | CVE Number | References | Status | Comments |
Framework | CVE-2021-0313 | A-170968514 | No | N/A to RealWear kernel version |
CVE-2021-0303 | A-170407229 | No | N/A to RealWear kernel version | |
CVE-2021-0306 | A-154505240 [2] | No | N/A to RealWear kernel version | |
CVE-2021-0307 | A-155648771 [2] | No | N/A to RealWear kernel version | |
CVE-2021-0310 | A-170212632 | No | N/A to RealWear kernel version | |
CVE-2021-0315 | A-169763814 | Included | ||
CVE-2021-0317 | A-168319670 | Included | ||
CVE-2021-0318 | A-168211968 | Included | ||
CVE-2021-0319 | A-167244818 | No | N/A to RealWear kernel version | |
CVE-2021-0304 | A-162738636 | Included | ||
CVE-2021-0309 | A-158480899 | Included | ||
CVE-2021-0321 | A-166667403 | No | N/A to RealWear kernel version | |
CVE-2021-0322 | A-159145361 [2] | Included | ||
CVE-2019-9376 | A-129287265 | No | N/A to RealWear kernel version | |
CVE-2020-15999 | A-171232105 | Included | ||
Media Framework | CVE-2016-6328 | A-162602132 | Included | |
CVE-2021-0311 | A-170240631 | Included | ||
CVE-2021-0312 | A-170583712 | Included | ||
System | CVE-2021-0316 | A-168802990 | Included | |
CVE-2020-0471 | A-169327567 | Included | ||
CVE-2021-0308 | A-158063095 | Included | ||
CVE-2021-0320 | A-169933423 | Included | ||
Google Play system updates | CVE-2021-0311, CVE-2021-0312 | No | N/A to RealWear kernel version | |
Kernel components | CVE-2020-10732 | A-170658976 Upstream kernel | No | N/A to RealWear kernel version |
CVE-2020-10766 | A-169505740 Upstream kernel | No | N/A to RealWear kernel version | |
CVE-2020-10767 | A-156766097 Upstream kernel | No | N/A to RealWear kernel version | |
MediaTek components | CVE-2021-0301 | A-172514667 M-ALPS05342361* | No | N/A to RealWear kernel version |
Qualcomm components | CVE-2020-11233 | A-170138863 QC-CR#2257789 | No | N/A to RealWear kernel version |
CVE-2020-11239 | A-168722551 QC-CR#2744826 | No | N/A to RealWear kernel version | |
CVE-2020-11240 | A-170138526 QC-CR#2702760 [2] [3] | No | N/A to RealWear kernel version | |
CVE-2020-11250 | A-170139097 QC-CR#2734543 | No | N/A to RealWear kernel version | |
CVE-2020-11261 | A-161373974 QC-CR#2742124 | No | N/A to RealWear kernel version | |
CVE-2020-11262 | A-170138789 QC-CR#2742711 | No | N/A to RealWear kernel version | |
Qualcomm closed-source components | CVE-2020-11134 CR2617125 | A-170138862* | No | N/A to RealWear kernel version |
CVE-2020-11182 CR2738672 | A-168722721* | No | N/A to RealWear kernel version | |
CVE-2020-11126 CR2609168 | A-170139227* | No | N/A to RealWear kernel version | |
CVE-2020-11159 CR2604636 | A-170138666* | No | N/A to RealWear kernel version | |
CVE-2020-11181 CR2664505 | A-168051034* | No | N/A to RealWear kernel version | |
CVE-2020-11235 CR2634794 CR2637648 CR2641024 | A-170138866* | No | N/A to RealWear kernel version | |
CVE-2020-11238 CR2694355 | A-170139099* | No | N/A to RealWear kernel version | |
CVE-2020-11241 CR2703058 | A-170139229* | No | N/A to RealWear kernel version | |
CVE-2020-11260 CR2735335 | A-168918332* | No | N/A to RealWear kernel version |
The specific bugs that have been fixed will be provided in the release notes when available. The fixes are not only to the operating system, but also to the RealWear native applications that are shipped with the operating system. Several have been incorporated directly, in response to issues discovered by the ISV partner community.
Item | Date – HMT-1 | Date – HMT-1Z1 |
Firmware Notice | 19 Jan 2021 | 19 Jan 2021 |
Firmware Beta Early Access Begins | 05 Jan 2021 | TBD |
Firmware General Availability | First half of March 2021 | First half of April 2021 |
Note: Dates are approximate and subject to change
This release was made available for Beta Early Access beginning 05 Jan 2021. To be added to the Allow List for Firmware Early Access (on no more than three devices), fill out the form here. After completing the form you will can upgrade via a Firmware Over the Air (FOTA) upgrade within one business day. If you do not receive access after than, email Support@RealWear.com.
IMPORTANT: Please ensure your RealWear device(s) have the below firmware versions installed and logging is activated.
RealWear Device | Firmware Version |
HMT-1 | 11.2.0-07-C.HMT-1.G |
HMT-1Z1 | 11.2.1-07-C.HMT-1Z1.S |
If you experience an unexpected result during the upgrade process, the device’s log files will detail the status of the device software and actions needed to complete the install process. Here is a guide to ensure your success during the update process.
Follow the update documentation outlined.
As always, provide complete information when contacting support to expedite the resolution process. Initiate the feedback via email with “Support@RealWear.com” in the “To” and your dedicated RealWear contact(s) + James Gordey (James@RealWear.com) on “Cc”.
Note: For best results enter the below adb command which provides much better information to our support and Engineering team than simple logcat
adb bugreport E:ReportsMyBugReports
RealWear encourages all product feedback. Send non-bug-related product feedback to James Gordey (James@RealWear.com), RealWear’s Device Software Product Manager, or via our Product Ideas portal.
By default, the firmware will be available to all devices upon General Availability. When ready, the Release general availability will be announced across all RealWear communication channels. For specific details on how to upgrade and RealWear’s Firmware Availability Policy visit the Knowledge Center.
Q: According to RealWear’s Firmware update and support policy which releases will be supported once Release 12 is generally available?
As outlined in the firmware policy, effective 01 Jan 2021 RealWear’s firmware support is for “N-2” releases meaning that only Releases 11.2, 11.1 and 11.0 are supported. Once Release 12 is generally available, only Releases 12, 11.2 and 11.1 will be supported.