同步操作将从 OpenHarmony/docs 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
OpenHarmony 3.0.7 LTS is a maintenance version of OpenHarmony 3.0 LTS. It has rectified certain issues detected in OpenHarmony 3.0.6 LTS.
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 3.0.7 LTS | NA |
(Optional) HUAWEI DevEco Studio | 3.0 Beta3 for OpenHarmony | Recommended for developing OpenHarmony applications |
(Optional) HUAWEI DevEco Device Tool | 3.0 Release | Recommended for developing OpenHarmony smart devices |
Register your account with Gitee.
Register an SSH public key for access to Gitee.
Install the git client and git-lfs, and configure user information.
git config --global user.name "yourname"
git config --global user.email "your-email-address"
git config --global credential.helper store
Run the following commands to install the repo tool:
curl -s https://gitee.com/oschina/repo/raw/fork_flow/repo-py3 > /usr/local/bin/repo # If you do not have the permission, download the tool to another directory and configure it as an environment variable by running the chmod a+x /usr/local/bin/repo command.
pip3 install -i https://repo.huaweicloud.com/repository/pypi/simple requests
Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.7-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2: Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.7-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Table 2 Mirrors for acquiring source code
LTS Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base (for mini, small, and standard systems) | 3.0.7 | Download | Download |
Standard system Hi3516 solution (binary) | 3.0.7 | Download | Download |
Mini system Hi3861 solution (binary) | 3.0.7 | Download | Download |
Small system Hi3516 solution - LiteOS (binary) | 3.0.7 | Download | Download |
Small system Hi3516 solution - Linux (binary) | 3.0.7 | Download | Download |
This version does not involve feature updates.
This version does not involve API updates.
For details about the adaptation status, see SIG_DevBoard.
Table 3 Fixed security vulnerabilities
Issue No. | Description | PR Link |
---|---|---|
I5VFI7 | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-3303, CVE-2022-42703, CVE-2022-20422, CVE-2022-41222, CVE-2022-3239, CVE-2022-20423 and CVE-2022-41850 | PR |
I5UHPU | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-40768, CVE-2022-3577, CVE-2022-20409, CVE-2022-3566, CVE-2022-3606, CVE-2022-3564 and CVE-2022-3649 | PR |
I5QBIA | Security vulnerability of the Kernel_linux_5.10 component: CVE-2022-1184 | PR |
I5VFK1 | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-20421, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721, CVE-2022-42722, CVE-2022-41674, CVE-2022-3535, CVE-2022-3521, CVE-2022-3565, CVE-2022-3594, CVE-2022-3435, CVE-2022-41849, CVE-2022-3524, CVE-2022-3542, and CVE-2022-3534 | PR |
I5OJL9 | Security vulnerability of the Kernel_linux_5.10 component: CVE-2022-26373 | PR |
I5WC2X | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-23816, CVE-2022-29901, and CVE-2022-29900 | PR |
I5VQVK | Security vulnerability of the Kernel_linux_5.10 component: CVE-2022-1462 | PR |
I5VP0D | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-39189, CVE-2022-39190, and CVE-2022-2663 | PR |
I5QBPW | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-39188, CVE-2022-3078, CVE-2022-2905, and CVE-2022-39842 | PR |
I5SCE3 | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-3202 and CVE-2022-40307 | PR |
I5QBK8 | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-3028, CVE-2022-2977, and CVE-2022-2964 | PR |
I5RQTK | Security vulnerability of the Kernel_linux_5.10 component: CVE-2022-3061 | PR |
I5R8CM | Security vulnerabilities of the Kernel_linux_5.10 component: CVE-2022-2959 and CVE-2022-2991 | PR |
I5R8BB | Security vulnerability of the Kernel_linux_5.10 component: CVE-2022-2503 | PR |
I5R6VI | Security vulnerability of the Kernel_linux_5.10 component: CVE-2022-2938 | PR |
I5ZA11 | Security vulnerabilities of the curl component: CVE-2022-32221, CVE-2022-42915, and CVE-2022-42916 | PR |
I5QBFJ | Security vulnerability of the curl component: CVE-2022-35252 | PR |
I5UHWM | Security vulnerability of the wayland component: CVE-2021-3782 | PR |
I5MVPK | Security vulnerability on the css-what component: CVE-2021-33587 | PR |
I5YR0H | Security vulnerability of the gstreamer component: CVE-2021-3185 | PR |
I5XT87 | Security vulnerability of the expat component: CVE-2022-43680 | PR |
I5SD4W | Security vulnerability of the expat component: CVE-2022-40674 | PR |
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。