同步操作将从 OpenHarmony/docs 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
OpenHarmony 1.1.5 LTS is a maintenance version of OpenHarmony 1.0.1 Release. This version has rectified certain issues and security vulnerabilities detected in OpenHarmony 1.1.4 LTS. It is the latest stable release with a tag.
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 1.1.5 LTS | N/A |
(Optional) HUAWEI DevEco Device Tool | 2.2 Beta2 | Recommended for developing OpenHarmony smart devices |
Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.5-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2: Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.5-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Table 2 Mirrors for acquiring source code
Source Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base | 1.1.5 | Download | Download |
Hi3861 solution (binary) for the mini system | 1.1.5 | Download | Download |
Hi3518 solution (binary) for the small system | 1.1.5 | Download | Download |
Hi3516 solution (binary) for the small system | 1.1.5 | Download | Download |
This version has the following updates to OpenHarmony 1.1.4 LTS.
This version does not involve feature updates.
This version does not involve API updates.
For details about the adaptation status, see SIG_DevBoard.
Table 3 Resolved security vulnerabilities
Issue No. | Description | PR Link |
---|---|---|
I58X0S | Security vulnerabilities of the curl component: CVE-2022-27781 and CVE-2022-27782 | PR |
I56PV4 | Security vulnerabilities of the curl component: CVE-2022-22576, CVE-2022-27775, CVE-2022-27774, and CVE-2022-27776 | PR |
NA | Security vulnerabilities of the curl component: CVE-2021-22945, CVE-2021-22946, and CVE-2021-22947 | PR |
I4QT0K/I56GI9 | Security vulnerabilities of the Mbed TLS component: CVE-2021-44732 and CVE-2021-45450 | PR |
I5F0WG | Security vulnerabilities of the freetype component: CVE-2022-27404 and CVE-2022-27406 | PR |
I4TLI9 | Security vulnerability of the freetype component: CVE-2020-15999 | PR |
I51D98 | Security vulnerability of the zlib component: CVE-2018-25032 | PR |
I5F13F/I4UHO4 | Security vulnerabilities of the FFmpeg component: CVE-2020-35964, CVE-2022-1475, CVE-2021-38291, CVE-2020-35965, CVE-2020-22042, CVE-2020-22038, CVE-2020-22037, CVE-2020-22021, and CVE-2020-22019 | PR |
Table 4 Resolved issues
Issue No. | Description |
---|---|
I4VKNM | There is a possibility that the testSigtimedwaitBlock test case fails to run on the Hi3518 development board in the small system. |
I4S098 | The system may stop responding when you repeat the following operations on the Hi3516 development board in the small system: Choose Settings > Wi-Fi, enter the Wi-Fi list page, and exit. |
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。