同步操作将从 OpenHarmony/docs 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
OpenHarmony 3.0.8 LTS is a maintenance version of OpenHarmony 3.0 LTS. It has rectified certain issues detected in OpenHarmony 3.0.7 LTS.
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 3.0.8 LTS | NA |
(Optional) HUAWEI DevEco Studio | 3.0 Beta3 for OpenHarmony | Recommended for developing OpenHarmony applications |
(Optional) HUAWEI DevEco Device Tool | 3.0 Release | Recommended for developing OpenHarmony smart devices |
Register your account with Gitee.
Register an SSH public key for access to Gitee.
Install the git client and git-lfs, and configure user information.
git config --global user.name "yourname"
git config --global user.email "your-email-address"
git config --global credential.helper store
Run the following commands to install the repo tool:
curl -s https://gitee.com/oschina/repo/raw/fork_flow/repo-py3 > /usr/local/bin/repo # If you do not have the permission, download the tool to another directory and configure it as an environment variable by running the chmod a+x /usr/local/bin/repo command.
pip3 install -i https://repo.huaweicloud.com/repository/pypi/simple requests
Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.8-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2: Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.8-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Table 2 Mirrors for acquiring source code
LTS Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base (for mini, small, and standard systems) | 3.0.8 | Download | Download |
Standard system Hi3516 solution (binary) | 3.0.8 | Download | Download |
Mini system Hi3861 solution (binary) | 3.0.8 | Download | Download |
Small system Hi3516 solution - LiteOS (binary) | 3.0.8 | Download | Download |
Small system Hi3516 solution - Linux (binary) | 3.0.8 | Download | Download |
This version does not involve feature updates.
This version does not involve API updates.
For details about the adaptation status, see SIG_DevBoard.
Table 3 Fixed security vulnerabilities
Issue No. | Description | PR Link |
---|---|---|
I5UHRW | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-41218, CVE-2022-3424, CVE-2022-42328, CVE-2022-3643, and CVE-2022-47946 | PR |
I648XK | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-3169 | PR |
I5QBIA | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-1184 | PR |
I62G8K | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-42895 and CVE-2022-42896 | PR |
I63VI6 | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-41858 | PR |
I63VID | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-45934, CVE-2022-4129, CVE-2022-4378, CVE-2022-3108, CVE-2022-47518, CVE-2022-47521, CVE-2022-47519, and CVE-2022-47520 | PR |
I65INV | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-4139 | PR |
I66Y94 | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-3105, CVE-2022-3104, CVE-2022-3115, CVE-2022-3113, and CVE-2022-3112 | PR |
I66Y9Y | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-3106 | PR |
I66YAD | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-3107 | PR |
I6A4HN | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-20568 | PR |
I6A4IZ | Security vulnerability of the kernel_linux_5.10 component: CVE-2023-20928 | PR |
I6B0AN | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-4696 | PR |
I6B0B4 | Security vulnerability of the kernel_linux_5.10 component: CVE-2023-23559, CVE-2023-0179, CVE-2023-23454, and CVE-2023-23455 | PR |
I65R5Q | Security vulnerability of the third_party_python component: CVE-2022-45061 | PR |
I6494T | Security vulnerabilities of the third_party_libxml2 component: CVE-2022-40303 and CVE-2022-40304 | PR |
I5ZYY3 | Security vulnerability of the third_party_pixman component: CVE-2022-44638 | PR |
I5UHVA | Security vulnerability of the third_party_u-boot component: CVE-2022-2347 | PR |
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。