同步操作将从 OpenHarmony/docs 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
OpenHarmony 3.1.4 Release provides enhanced system security over OpenHarmony 3.1.3 Release by rectifying certain known vulnerabilities in open-source components such as Linux kernel. It also provides new SDK versions and resolves previewer issues.
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 3.1.4 Release | NA |
Full SDK | Ohos_sdk_full 3.1.9.7 (API Version 8 Relese) | This toolkit is intended for original equipment manufacturers (OEMs) and contains system APIs that require system permissions. To use the Full SDK, you must manually obtain it from the mirror and switch to it in DevEco Studio. For details, see Guide to Switching to Full SDK. |
Public SDK | Ohos_sdk_public 3.1.9.7 (API Version 8 Release) | This toolkit is intended for application developers and does not contain system APIs that require system permissions. It is provided as standard in DevEco Studio 3.0 Beta4 or later. |
(Optional) HUAWEI DevEco Studio | 3.1 Preview for OpenHarmony | Recommended for developing OpenHarmony applications |
(Optional) HUAWEI DevEco Device Tool | 3.0 Release | Recommended for developing OpenHarmony smart devices |
Register your account with Gitee.
Register an SSH public key for access to Gitee.
Install the git client and git-lfs, and configure user information.
git config --global user.name "yourname"
git config --global user.email "your-email-address"
git config --global credential.helper store
Run the following commands to install the repo tool:
curl -s https://gitee.com/oschina/repo/raw/fork_flow/repo-py3 > /usr/local/bin/repo # If you do not have the permission, download the tool to another directory and configure it as an environment variable by running the chmod a+x /usr/local/bin/repo command.
pip3 install -i https://repo.huaweicloud.com/repository/pypi/simple requests
Method 1 (recommended)
Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v3.1.4-Release --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2
Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v3.1.4-Release --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Table 2 Mirrors for acquiring source code
Source Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base (for mini, small, and standard systems) | 3.1.4 Release | Download | Download |
Hi3516 standard system solution (binary) | 3.1.4 Release | Download | Download |
RK3568 standard system solution (binary) | 3.1.4 Release | Download | Download |
Hi3861 mini system solution (binary) | 3.1.4 Release | Download | Download |
Hi3516 small system solution - LiteOS (binary) | 3.1.4 Release | Download | Download |
Hi3516 small system solution - Linux (binary) | 3.1.4 Release | Download | Download |
Full SDK package for the standard system (macOS) | 3.1.9.7 | Download | Download |
Full SDK package for the standard system (Windows/Linux) | 3.1.9.7 | Download | Download |
Public SDK package for the standard system (macOS) | 3.1.9.7 | Download | Download |
Public SDK package for the standard system (Windows/Linux) | 3.1.9.7 | Download | Download |
This version has the following updates to OpenHarmony 3.1.3 Release.
This version does not involve feature updates.
This version does not involve API updates.
For details about the adaptation status, see SIG_DevBoard.
Table 3 Resolved issues
Subsystem | Description |
---|---|
SDK subsystem | Previewer issues. (I59433, I5K6B1, I5C9XJ, and I5AVZT) |
Demo application | Applications become inaccessible after you exit Settings on a small-system device. (I5KTI8) |
Table 4 Fixed security vulnerabilities
Issue No. | Description | PR Link |
---|---|---|
I5SD5S | Security vulnerability of the expat component: CVE-2022-40674. | PR |
I5XTS9 | Security vulnerability of the expat component: CVE-2022-43680. | PR |
I5VNM9 | Security vulnerability of the skia component: CVE-2022-27405. | PR |
I5VGM0 | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-20421, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721, CVE-2022-42722, CVE-2022-41674, CVE-2022-3535, CVE-2022-3521, CVE-2022-3565, CVE-2022-3594, CVE-2022-3435, CVE-2022-41849, CVE-2022-3524, CVE-2022-3542, and CVE-2022-3534. | PR |
I5SBWK | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-3202 and CVE-2022-40307. | PR |
I5QBUR | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-1184. | PR |
I5WSJ5 | Security vulnerabilities of the chromium component: CVE-2022-3199, CVE-2022-3046, CVE-2022-3041, CVE-2022-3040, CVE-2022-3039, CVE-2022-3038, CVE-2022-3057, CVE-2022-3195, CVE-2022-3054, and CVE-2022-3075. The webview HAP file is updated. | PR |
I5UF8Z | MAC addresses are leaked in dhd_linux.c on the standard system. | PR |
I5VISW | MAC addresses are displayed in plaintext in Bluetooth logs on the standard system. | PR |
I5WJU0 | Device UDIDs are displayed in distributed networking logs of the standard system. | PR |
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。