OpenHarmony 3.0.8 LTS is a maintenance version of OpenHarmony 3.0 LTS. It has rectified certain issues detected in OpenHarmony 3.0.7 LTS.
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 3.0.8 LTS | NA |
(Optional) HUAWEI DevEco Studio | 3.0 Beta3 for OpenHarmony | Recommended for developing OpenHarmony applications |
(Optional) HUAWEI DevEco Device Tool | 3.0 Release | Recommended for developing OpenHarmony smart devices |
-
Register your account with Gitee.
-
Register an SSH public key for access to Gitee.
-
Install the git client and git-lfs, and configure user information.
git config --global user.name "yourname" git config --global user.email "your-email-address" git config --global credential.helper store
-
Run the following commands to install the repo tool:
curl -s https://gitee.com/oschina/repo/raw/fork_flow/repo-py3 > /usr/local/bin/repo # If you do not have the permission, download the tool to another directory and configure it as an environment variable by running the chmod a+x /usr/local/bin/repo command. pip3 install -i https://repo.huaweicloud.com/repository/pypi/simple requests
Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.8-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2: Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.8-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Table 2 Mirrors for acquiring source code
LTS Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base (for mini, small, and standard systems) | 3.0.8 | Download | Download |
Standard system Hi3516 solution (binary) | 3.0.8 | Download | Download |
Mini system Hi3861 solution (binary) | 3.0.8 | Download | Download |
Small system Hi3516 solution - LiteOS (binary) | 3.0.8 | Download | Download |
Small system Hi3516 solution - Linux (binary) | 3.0.8 | Download | Download |
This version does not involve feature updates.
This version does not involve API updates.
For details about the adaptation status, see SIG_DevBoard.
Table 3 Fixed security vulnerabilities
Issue No. | Description | PR Link |
---|---|---|
I5UHRW | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-41218, CVE-2022-3424, CVE-2022-42328, CVE-2022-3643, and CVE-2022-47946 | PR |
I648XK | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-3169 | PR |
I5QBIA | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-1184 | PR |
I62G8K | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-42895 and CVE-2022-42896 | PR |
I63VI6 | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-41858 | PR |
I63VID | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-45934, CVE-2022-4129, CVE-2022-4378, CVE-2022-3108, CVE-2022-47518, CVE-2022-47521, CVE-2022-47519, and CVE-2022-47520 | PR |
I65INV | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-4139 | PR |
I66Y94 | Security vulnerabilities of the kernel_linux_5.10 component: CVE-2022-3105, CVE-2022-3104, CVE-2022-3115, CVE-2022-3113, and CVE-2022-3112 | PR |
I66Y9Y | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-3106 | PR |
I66YAD | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-3107 | PR |
I6A4HN | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-20568 | PR |
I6A4IZ | Security vulnerability of the kernel_linux_5.10 component: CVE-2023-20928 | PR |
I6B0AN | Security vulnerability of the kernel_linux_5.10 component: CVE-2022-4696 | PR |
I6B0B4 | Security vulnerability of the kernel_linux_5.10 component: CVE-2023-23559, CVE-2023-0179, CVE-2023-23454, and CVE-2023-23455 | PR |
I65R5Q | Security vulnerability of the third_party_python component: CVE-2022-45061 | PR |
I6494T | Security vulnerabilities of the third_party_libxml2 component: CVE-2022-40303 and CVE-2022-40304 | PR |
I5ZYY3 | Security vulnerability of the third_party_pixman component: CVE-2022-44638 | PR |
I5UHVA | Security vulnerability of the third_party_u-boot component: CVE-2022-2347 | PR |