OpenHarmony 1.1.5 LTS (EOL)
Version Description
OpenHarmony 1.1.5 LTS is a maintenance version of OpenHarmony 1.0.1 Release. This version has rectified certain issues and security vulnerabilities detected in OpenHarmony 1.1.4 LTS. It is the latest stable release with a tag.
Version Mapping
Table 1 Version mapping of software and tools
Software/Tool | Version | Remarks |
---|---|---|
OpenHarmony | 1.1.5 LTS | N/A |
(Optional) HUAWEI DevEco Device Tool | 2.2 Beta2 | Recommended for developing OpenHarmony smart devices |
Source Code Acquisition
Acquiring Source Code Using the repo Tool
Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.5-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Method 2: Use the repo tool to download the source code over HTTPS.
repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.5-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
Acquiring Source Code from Mirrors
Table 2 Mirrors for acquiring source code
Source Code | Version | Mirror | SHA-256 Checksum |
---|---|---|---|
Full code base | 1.1.5 | Download | Download |
Hi3861 solution (binary) for the mini system | 1.1.5 | Download | Download |
Hi3518 solution (binary) for the small system | 1.1.5 | Download | Download |
Hi3516 solution (binary) for the small system | 1.1.5 | Download | Download |
What's New
This version has the following updates to OpenHarmony 1.1.4 LTS.
Feature Updates
This version does not involve feature updates.
API Updates
This version does not involve API updates.
Chip and Development Board Adaptation
For details about the adaptation status, see SIG_DevBoard.
Resolved Issues
Table 3 Resolved security vulnerabilities
Issue No. | Description | PR Link |
---|---|---|
I58X0S | Security vulnerabilities of the curl component: CVE-2022-27781 and CVE-2022-27782 | PR |
I56PV4 | Security vulnerabilities of the curl component: CVE-2022-22576, CVE-2022-27775, CVE-2022-27774, and CVE-2022-27776 | PR |
NA | Security vulnerabilities of the curl component: CVE-2021-22945, CVE-2021-22946, and CVE-2021-22947 | PR |
I4QT0K/I56GI9 | Security vulnerabilities of the Mbed TLS component: CVE-2021-44732 and CVE-2021-45450 | PR |
I5F0WG | Security vulnerabilities of the freetype component: CVE-2022-27404 and CVE-2022-27406 | PR |
I4TLI9 | Security vulnerability of the freetype component: CVE-2020-15999 | PR |
I51D98 | Security vulnerability of the zlib component: CVE-2018-25032 | PR |
I5F13F/I4UHO4 | Security vulnerabilities of the FFmpeg component: CVE-2020-35964, CVE-2022-1475, CVE-2021-38291, CVE-2020-35965, CVE-2020-22042, CVE-2020-22038, CVE-2020-22037, CVE-2020-22021, and CVE-2020-22019 | PR |
Table 4 Resolved issues
Issue No. | Description |
---|---|
I4VKNM | There is a possibility that the testSigtimedwaitBlock test case fails to run on the Hi3518 development board in the small system. |
I4S098 | The system may stop responding when you repeat the following operations on the Hi3516 development board in the small system: Choose Settings > Wi-Fi, enter the Wi-Fi list page, and exit. |