• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# OpenHarmony 3.0.5 LTS
2
3
4## Version Description
5
6OpenHarmony 3.0.5 LTS is a maintenance version of OpenHarmony 3.0 LTS. This version has rectified certain issues detected in OpenHarmony 3.0.3 LTS and provides the following capability updates.
7
8**Enhanced capabilities for the small system**
9
10The DFX subsystem supports native crash information collection and device restart fault locating. The communication subsystem supports basic STA capabilities.
11
12
13## Version Mapping
14
15  **Table 1** Version mapping of software and tools
16
17| Software/Tool| Version| Remarks|
18| -------- | -------- | -------- |
19| OpenHarmony | 3.0.5 LTS| NA |
20| (Optional) HUAWEI DevEco Studio| 3.0 Beta1| Recommended for developing OpenHarmony applications|
21| (Optional) HUAWEI DevEco Device Tool| 2.2 Beta2 | Recommended for developing OpenHarmony smart devices|
22
23
24## Source Code Acquisition
25
26
27### Prerequisites
28
291. Register your account with Gitee.
30
312. Register an SSH public key for access to Gitee.
32
333. Install the [git client](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git) and [git-lfs](https://gitee.com/vcs-all-in-one/git-lfs?_from=gitee_search#downloading), and configure user information.
34
35   ```
36   git config --global user.name "yourname"
37   git config --global user.email "your-email-address"
38   git config --global credential.helper store
39   ```
40
414. Run the following commands to install the **repo** tool:
42
43   ```
44   curl -s https://gitee.com/oschina/repo/raw/fork_flow/repo-py3 > /usr/local/bin/repo  # If you do not have the permission, download the tool to another directory and configure it as an environment variable by running the chmod a+x /usr/local/bin/repo command.
45   pip3 install -i https://repo.huaweicloud.com/repository/pypi/simple requests
46   ```
47
48
49### Acquiring Source Code Using the repo Tool
50
51**Method 1 (recommended)**: Use the **repo** tool to download the source code over SSH. (You must have an SSH public key for access to Gitee.)
52
53
54```
55repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.5-LTS --no-repo-verify
56repo sync -c
57repo forall -c 'git lfs pull'
58```
59
60**Method 2**: Use the **repo** tool to download the source code over HTTPS.
61
62
63```
64repo init -u https://gitee.com/openharmony/manifest.git -b refs/tags/OpenHarmony-v3.0.5-LTS --no-repo-verify
65repo sync -c
66repo forall -c 'git lfs pull'
67```
68
69
70### Acquiring Source Code from Mirrors
71
72  **Table 2** Mirrors for acquiring source code
73
74| LTS Code| Version| Mirror| SHA-256 Checksum|
75| -------- | -------- | -------- | -------- |
76| Full code base (for mini, small, and standard systems)| 3.0.5 | [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/code-v3.0.5-LTS.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/code-v3.0.5-LTS.tar.gz.sha256)|
77| Standard system Hi3516 solution (binary)| 3.0.5 | [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/standard.tar.gz)| [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/standard.tar.gz.sha256)|
78| Mini system Hi3861 solution (binary)| 3.0.5 | [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/hispark_pegasus.tar.gz)| [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/hispark_pegasus.tar.gz.sha256)|
79| Small system Hi3516 solution - LiteOS (binary)| 3.0.5 | [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/hispark_taurus.tar.gz)| [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/hispark_taurus.tar.gz.sha256)|
80| Small system Hi3516 solution - Linux (binary)| 3.0.5 | [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/hispark_taurus_linux.tar.gz)| [Download](https://repo.huaweicloud.com/openharmony/os/3.0.5/hispark_taurus_linux.tar.gz.sha256)|
81
82
83## What's New
84
85
86### Feature Updates
87
88  **Table 3** New and enhanced features
89
90| Subsystem| Standard System| Mini and Small Systems|
91| -------- | -------- | -------- |
92| Communication| NA | Added basic STA capabilities for small-system devices (Linux).<br>The following requirements are involved:<br>I5AAFQ Supporting STA features such as scanning, connection, and automatic reconnection<br>I5AAFQ Dynamically obtaining IPv4 addresses for STA connections|
93| DFX| NA | Added native crash information collection and device restart fault locating for small-system devices (Linux).<br>The following requirements are involved:<br>I57I8Y/I57TOE Collecting native crash information<br>I5C0QR Locating device restart faults on Linux 5.10|
94
95
96### API Updates
97
98This version does not involve API updates.
99
100
101### Chip and Development Board Adaptation
102
103For details about the adaptation status, see [SIG_DevBoard](https://gitee.com/openharmony/community/blob/master/sig/sig_devboard/sig_devboard.md).
104
105
106## Resolved Issues
107
108  **Table 4** Resolved issues
109
110| Issue No.| Description|
111| -------- | -------- |
112| [I4YBB0](https://gitee.com/openharmony/multimedia_camera_lite/issues/I4YBB0) | No image is generated and the recorded video cannot be played when the system camera is used to take a photo and record a video. This issue occurs only for the Hi3516D V300 development board running on a small-system device (Linux).|
113| [I4YB87](https://gitee.com/openharmony/multimedia_camera_lite/issues/I4YB87) | No image is generated when the system camera is used to take a photo. This issue occurs only for the Hi3516D V300 development board running on a small-system device (Linux).|
114| [I4YAGS](https://gitee.com/openharmony/multimedia_camera_lite/issues/I4YAGS?from=project-issue) | A blue screen is displayed when the system camera is accessed. This issue occurs only for the Hi3516D V300 development board running on a small-system device (Linux).|
115| [I59FZ7](https://gitee.com/openharmony/telephony_core_service/issues/I59FZ7) | Test cases of the telephony subsystem fail to run on standard-system devices.|
116| [I4Z2MI](https://gitee.com/openharmony/xts_acts/issues/I4Z2MI) | All test cases of the actsWifiJSApiTest, ActsHotSpotJSApiTest, and ActsP2PJSApiTest modules fail to run on standard-system devices.|
117
118
119## Fixed Security Vulnerabilities
120
121The following vulnerabilities are reported by the project teams. For details about the affected versions and patches released to fix the vulnerabilities, see [Security Vulnerability Disclosure](https://gitee.com/openharmony/security/tree/master/en/security-disclosure/2022).
122
123  Table 5 Fixed security vulnerabilities
124
125| Vulnerability ID| Description| Impact| Affected Repository|
126| -------- | -------- | -------- | -------- |
127| OpenHarmony-SA-2022-0501 | The DSoftBus subsystem has a heap overflow vulnerability.| Attackers can launch attacks locally, causing out-of-bounds memory access and obtaining system control rights.| communication_dsoftbus |
128| OpenHarmony-SA-2022-0502 | The DSoftBus subsystem has a heap overflow vulnerability when receiving TCP messages.| Attackers can launch attacks on the LAN to remotely execute code and obtain system control rights.| communication_dsoftbus |
129| OpenHarmony-SA-2022-0503 | The DSoftBus subsystem has an out-of-bounds access vulnerability when processing device synchronization messages.| Attackers can launch DoS attacks on the LAN, causing out-of-bounds memory access.| communication_dsoftbus |
130| OpenHarmony-SA-2022-0504 | A pointer member contained in the **Lock** class is repeatedly released.| Attackers can launch attacks locally to obtain system control rights.| global_resmgr_standard |
131| OpenHarmony-SA-2022-0601 | The common event and notification subsystem has an authentication bypass vulnerability when deserializing objects.| Attackers can launch attacks locally to bypass permissions, causing server process breakdown.| notification_ces_standard |
132| OpenHarmony-SA-2022-0602 | The common event and notification subsystem has a verification bypass vulnerability, which can initiate SA relay attacks.| Attackers can launch attacks locally to bypass verification and obtain system control rights.| notification_ces_standard |
133| OpenHarmony-SA-2022-0603 | The update module has a verification bypass vulnerability, which can initiate SA relay attacks.| Attackers can launch attacks locally to bypass verification and obtain system control rights.| update_updateservice |
134| OpenHarmony-SA-2022-0604 | The multimedia subsystem has a verification bypass vulnerability, which can initiate SA relay attacks.| Attackers can launch attacks locally to bypass verification and obtain system control rights.| multimedia_media_standard |
135