OpenHarmony 1.1.5 LTS (EOL)

Version Description

OpenHarmony 1.1.5 LTS is a maintenance version of OpenHarmony 1.0.1 Release. This version has rectified certain issues and security vulnerabilities detected in OpenHarmony 1.1.4 LTS. It is the latest stable release with a tag.

Version Mapping

Table 1 Version mapping of software and tools

Software/Tool Version Remarks
OpenHarmony 1.1.5 LTS N/A
(Optional) HUAWEI DevEco Device Tool 2.2 Beta2 Recommended for developing OpenHarmony smart devices

Source Code Acquisition

Acquiring Source Code Using the repo Tool

Method 1 (recommended): Use the repo tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)

repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.5-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'

Method 2: Use the repo tool to download the source code over HTTPS.

repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v1.1.5-LTS --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'

Acquiring Source Code from Mirrors

Table 2 Mirrors for acquiring source code

Source Code Version Mirror SHA-256 Checksum
Full code base 1.1.5 Download Download
Hi3861 solution (binary) for the mini system 1.1.5 Download Download
Hi3518 solution (binary) for the small system 1.1.5 Download Download
Hi3516 solution (binary) for the small system 1.1.5 Download Download

What's New

This version has the following updates to OpenHarmony 1.1.4 LTS.

Feature Updates

This version does not involve feature updates.

API Updates

This version does not involve API updates.

Chip and Development Board Adaptation

For details about the adaptation status, see SIG_DevBoard.

Resolved Issues

Table 3 Resolved security vulnerabilities

Issue No. Description PR Link
I58X0S Security vulnerabilities of the curl component: CVE-2022-27781 and CVE-2022-27782 PR
I56PV4 Security vulnerabilities of the curl component: CVE-2022-22576, CVE-2022-27775, CVE-2022-27774, and CVE-2022-27776 PR
NA Security vulnerabilities of the curl component: CVE-2021-22945, CVE-2021-22946, and CVE-2021-22947 PR
I4QT0K/I56GI9 Security vulnerabilities of the Mbed TLS component: CVE-2021-44732 and CVE-2021-45450 PR
I5F0WG Security vulnerabilities of the freetype component: CVE-2022-27404 and CVE-2022-27406 PR
I4TLI9 Security vulnerability of the freetype component: CVE-2020-15999 PR
I51D98 Security vulnerability of the zlib component: CVE-2018-25032 PR
I5F13F/I4UHO4 Security vulnerabilities of the FFmpeg component: CVE-2020-35964, CVE-2022-1475, CVE-2021-38291, CVE-2020-35965, CVE-2020-22042, CVE-2020-22038, CVE-2020-22037, CVE-2020-22021, and CVE-2020-22019 PR

Table 4 Resolved issues

Issue No. Description
I4VKNM There is a possibility that the testSigtimedwaitBlock test case fails to run on the Hi3518 development board in the small system.
I4S098 The system may stop responding when you repeat the following operations on the Hi3516 development board in the small system: Choose Settings > Wi-Fi, enter the Wi-Fi list page, and exit.