OpenHarmony 1.1.4 LTS is a maintenance version with a tag of OpenHarmony 1.1.3 LTS. This version has rectified certain issues and security vulnerabilities detected in OpenHarmony 1.1.3 LTS.
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 1.1.4 LTS | NA |
(Optional) HUAWEI DevEco Device Tool | 2.2 Beta2 | Recommended for developing OpenHarmony smart devices |
Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.4-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2: Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.4-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Table 2 Mirrors for acquiring source code
Source Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base | 1.1.4 | Download | Download |
Hi3861 solution (binary) for the mini system | 1.1.4 | Download | Download |
Hi3518 solution (binary) for the small system | 1.1.4 | Download | Download |
Hi3516 solution (binary) for the small system | 1.1.4 | Download | Download |
This version has the following updates to OpenHarmony 1.1.3 LTS.
This version does not involve feature updates.
This version does not involve API updates.
For details about the adaptation status, see SIG_DevBoard.
Table 3 Resolved security vulnerabilities
Issue No. | Description |
---|---|
I4AJEN | Fixed the CVE-2020-15999 security vulnerability of the third_party_freetype component. |
I4AJ6T | Fixed the CVE-2020-36475 and CVE-2020-36478 security vulnerabilities of the third_party_mbedtls component. |
I4AIYJ | Fixed the CVE-2021-27138 and CVE-2021-27097 security vulnerabilities of the third_party_uboot component. |
I4HUM6 | Fixed the CVE-2020-22284 security vulnerability of the third_party_lwip component. |
I4QTVZ | Fixed the CVE-2021-44732 and CVE-2021-45450 security vulnerabilities of the third_party_mbedtls component. |
I46RRM | Fixed copying of secondary device types for the P2P group client. |
Table 4 Resolved issues
Issue No. | Description |
---|---|
I457ZZ | Fixed nested locking in the OsLockDepCheckIn exception handling. |
I3WU8Y | Fixed the failed test cases in the storage directory of the FS module during the integration test of the lightweight kernel subsystem. |
I4AJI2 | Upgraded the FFmpeg version to 4.3.1. |
I3HXIX | Fixed the possible system error in the case of multiple processes, which is caused because the kernel operation node of the pipe uses the dirty private field dev. |
I4QO9B | Fixed freezing when returning from the WLAN list to the home screen. |
I4EPVL | Temporarily removed the ActsCMSISTest test case since the CMSIS code is not yet compatible with third-party chips. |
I4QQU9 | Fixed the issue where the serial port logs contain the board IP address and MAC address when the XTS test suite ActsNetTest is executed on the Hi3516 or Hi3518 board of a small-system device. |
N/A
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。