# OpenHarmony 4.1.3 Release
## Version Overview
OpenHarmony 4.1.3 Release provides enhanced system security over OpenHarmony 4.1.2 Release by rectifying certain known vulnerabilities in open-source components such as Linux kernel, and system stability issues.
## Mapping Relationship
**Table 1** Version mapping of software and tools
| Software/Tool| Version| Remarks|
| -------- | -------- | -------- |
| OpenHarmony | 4.1.3 Release | NA |
| Public SDK | Ohos_sdk_public 4.1.9.4 (API Version 11 Release) | This toolkit is intended for application developers and does not contain system APIs that require system permissions.|
| (Optional) HUAWEI DevEco Studio| 4.1 Release | Recommended for developing OpenHarmony applications. How to obtain:
SHA-256 checksum: c46be4f3cfde27af1806cfc9860d9c366e66a20e31e15180cf3a90ab05464650
SHA-256 checksum: 15d6136959b715e4bb2160c41d405b889820ea26ceadbb416509a43e59ed7f09
SHA-256 checksum: ac04ca7c2344ec8f27531d5a59261ff037deed2c5a3d42ef88e6f90f4ed45484 |
| (Optional) HUAWEI DevEco Device Tool| 4.0 Release | Recommended for developing OpenHarmony smart devices
[Click here](https://device.harmonyos.com/cn/develop/ide#download). |
## Source Code Acquisition
### Prerequisites
1. Register your account with Gitee.
2. Register an SSH public key for access to Gitee.
3. Install the [git client](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git) and [git-lfs](https://gitee.com/vcs-all-in-one/git-lfs?_from=gitee_search#downloading), and configure user information.
```
git config --global user.name "yourname"
git config --global user.email "your-email-address"
git config --global credential.helper store
```
4. Install the **repo** tool.
```
curl -s https://gitee.com/oschina/repo/raw/fork_flow/repo-py3 > /usr/local/bin/repo # If you do not have the permission, download the tool to another directory and add that directory to environment variables. chmod a+x /usr/local/bin/repo
pip3 install -i https://repo.huaweicloud.com/repository/pypi/simple requests
```
### Acquiring Source Code Using the repo Tool
**Method 1: Using SSH (Recommended)**
This method requires an SSH public key for access to Gitee.
Obtain the source code from the specified version tag, which is the same as that released with the version.
```
repo init -u git@gitee.com:openharmony/manifest.git -b refs/tags/OpenHarmony-v4.1.3-Release --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
```
**Method 2**
Use the **repo** tool to download the source code over HTTPS.
Obtain the source code from the specified version tag, which is the same as that released with the version.
```
repo init -u https://gitee.com/openharmony/manifest -b refs/tags/OpenHarmony-v4.1.3-Release --no-repo-verify
repo sync -c
repo forall -c 'git lfs pull'
```
### Acquiring Source Code from Mirrors
**Table 2** Mirrors for acquiring source code
| Source Code | Version| Mirror | SHA-256 Checksum | Software Package Size|
| --------------------------------------- | ------------ | ------------------------------------------------------------ | ------------------------------------------------------------ | -------- |
| Full code base (for mini, small, and standard systems) | 4.1.3 Release | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/code-v4.1.3-Release.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/code-v4.1.3-Release.tar.gz.sha256) | 34.8 GB |
| Hi3861 solution (binary) | 4.1.3 Release | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/hispark_pegasus.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/hispark_pegasus.tar.gz.sha256) | 27.1 MB |
| Hi3516 solution-LiteOS (binary)| 4.1.3Release | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/hispark_taurus_LiteOS.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/hispark_taurus_LiteOS.tar.gz.sha256) | 320.1 MB |
| Hi3516 solution-Linux (binary) | 4.1.3 Release | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/hispark_taurus_Linux.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/hispark_taurus_Linux.tar.gz.sha256) | 215.1 MB |
| RK3568 standard system solution (binary) | 4.1.3 Release | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/dayu200_standard_arm32.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/dayu200_standard_arm32.tar.gz.sha256) | 8.4 GB |
| Public SDK package for the standard system (macOS) | 4.1.9.4 | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/ohos-sdk-mac-public.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/ohos-sdk-mac-public.tar.gz.sha256) | 913.3 MB |
| Public SDK package for the standard system (macOS-M1) | 4.1.9.4 | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/L2-SDK-MAC-M1-PUBLIC.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/L2-SDK-MAC-M1-PUBLIC.tar.gz.sha256) | 884.0 MB |
| Public SDK package for the standard system (Windows/Linux) | 4.1.9.4 | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/ohos-sdk-windows_linux-public.tar.gz) | [Download](https://repo.huaweicloud.com/openharmony/os/4.1.3-Release/ohos-sdk-windows_linux-public.tar.gz.sha256) | 2.2 GB |
## What's New
N/A
## Fixed Bugs and Security Issues
**Table 3** Resolved issues
| Issue No.| Description|
| -------- | -------- |
| [IAOH0J](https://gitee.com/openharmony/useriam_user_auth_framework/issues/IAOH0J?from=project-issue) | [RK3568] The libuserauth_client.z.so process crashes due to the OS_IPC_2_834 thread in the foundation process.|
| [IBE7FX](https://gitee.com/openharmony/third_party_musl/issues/IBE7FX?from=project-issue) | [RK3568] The cppcrash occurs in the OS_IPC_6_936 thread under the foundation process once. The crash stack is libdistributed_ability_manager_svr.z.so.|
| [IB7TVH](https://gitee.com/openharmony/communication_netmanager_base/issues/IB7TVH?from=project-issue) | [RK3568] The OS_IPC_2_784 thread under the Process name:foundation process crashes twice. The crash stack is libnet_manager_common.z.so.|
| [IBBNLR](https://gitee.com/openharmony/commonlibrary_ets_utils/issues/IBBNLR?from=project-issue) | [RK3568] Fixed the worker memory leak. |
| [IAPG6G](https://gitee.com/openharmony/filemanagement_dfs_service/issues/IAPG6G?from=project-issue) | [RK3568] CloudFileService is a non-resident process and is started by the Wi-Fi scanning event loop.|
| [IAAB5R](https://gitee.com/openharmony/arkui_ace_engine/issues/IAAB5R?from=project-issue) | [RK3568] [10/10] The editable component that is set to.enabled (false) is dragged to the text component area. The component center is 8 vp above the top.|
| [I9BKLO](https://gitee.com/openharmony/applications_mms/issues/I9BKLO?from=project-issue) | [RK3568] jscrash is displayed under the com.ohos.mms process twice, and the stack name is nameClick.|
| [IAVSNL](https://gitee.com/openharmony/web_webview/issues/IAVSNL?from=project-issue) | [RK3568] Verifying the UID when processing the edm event |
| [IBH4N7](https://gitee.com/openharmony/distributedhardware_device_manager/issues/IBH4N7?from=project-issue) | [RK3568] UX modification of the 4.1 release branch |
| [IBJL5T](https://gitee.com/openharmony/web_webview/issues/IBJL5T?from=project-issue) | [RK3568] The rendering function is unavailable when nodelesses.hap is installed for the same-layer rendering test.|
| [IBJ6EC](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBJ6EC?from=project-issue) | [RK3568] Cherry-Pick 10577 to 4.1 Release |
| [IBJ7R4](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBJ7R4?from=project-issue) | [RK3568] Cherry-Pick 10642 to 4.1 Release |
| [IBKK6D](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBKK6D?from=project-issue) | [RK3568] Join Issue After Cherry-Picking PR 10501 to 4.1 Release |
| [IBJ90O](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBJ90O?from=project-issue) | [RK3568] Cherry-pick 10670 to 4.1Release |
| [IBH1E9](https://gitee.com/openharmony/window_window_manager/issues/IBH1E9?from=project-issue) | [RK3568] A C++ crash occurs on libmodal_system_ui_extension_client.z.so due to an error of the OS_FFRT_2_0 thread of the foundation process. This issue occurs twice.|
| [IBIZ14](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBIZ14?from=project-issue) | [RK3568] The vulnerability is incorporated into the OpenHarmony-4.1-Release branch. |
| [IBIWKU](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBIWKU?from=project-issue) | [RK3568] Cherry-Pick bug fix to 4.1 |
| [IBI74E](https://gitee.com/openharmony/communication_dsoftbus/issues/IBI74E?from=project-issue) | [RK3568] Fixed risky vulnerabilities. |
| [IBGUBD](https://gitee.com/openharmony/applications_app_samples/issues/IBGUBD?from=project-issue) | [RK3568] Deleted redundant binary files from WorkScheduler. |
| [IBGHNE](https://gitee.com/openharmony/applications_app_samples/issues/IBGHNE?from=project-issue) | [RK3568] Upgrading the HapBuild Project, Deleting Redundant Files, and Replacing the Signing Tool|
| [IBGJHO](https://gitee.com/openharmony/arkui_ace_engine/issues/IBGJHO?from=project-issue) | [RK3568] The editable component that is set to.enabled(false) is dragged to the text component area. The component is 8 vp from the top center of the component. |
**Table 4** Fixed security vulnerabilities
| Issue No. | Description |
| :----------------------------------------------------------- | ------------------------------------------------------------ |
| [IBHYAM](https://gitee.com/openharmony/arkcompiler_ets_runtime/issues/IBHYAM?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-871978016102682624|
| [IBISRC](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISRC?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56605 in the Linux kernel component|
| [IBLGDX](https://gitee.com/openharmony/third_party_NuttX/issues/IBLGDX?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-884973832148881408 |
| [IBISTN](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISTN?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56647 in the Linux kernel component|
| [IBISOU](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISOU?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56583 in the Linux kernel component|
| [IBISPT](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISPT?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-53171 in the Linux kernel component|
| [IBISSV](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISSV?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56606 in the Linux kernel component|
| [IBISUH](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISUH?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56658 in the Linux kernel component|
| [IBISV2](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISV2?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56688 in the Linux kernel component|
| [IBISWH](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISWH?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56692 in the Linux kernel component|
| [IBISXD](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISXD?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56720 in the Linux kernel component|
| [IBISYG](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISYG?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56739 in the Linux kernel component|
| [IBISZC](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBISZC?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56756 in the Linux kernel component|
| [IBIT1N](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBIT1N?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56763 in the Linux kernel component|
| [IBIT2H](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBIT2H?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56769 in the Linux kernel component|
| [IBIT3K](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBIT3K?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56770 in the Linux kernel component|
| [IBK84G](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBK84G?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE patches incorporated |
| [IBJSHR](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBJSHR?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-53173 in the Linux kernel component|
| [IBJSIV](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBJSIV?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-56369 in the Linux kernel component|
| [IBKPCV](https://gitee.com/openharmony/kernel_liteos_a/issues/IBKPCV?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-887050703653048320 |
| [IBINMH](https://gitee.com/openharmony/communication_dsoftbus/issues/IBINMH?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-871975948294033408 |
| [IBINMC](https://gitee.com/openharmony/communication_dsoftbus/issues/IBINMC?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-871976081169584128 |
| [IBG37W](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBG37W?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE patches incorporated |
| [IBIKDC](https://gitee.com/openharmony/kernel_liteos_a/issues/IBIKDC?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-879923376297086976 |
| [IBI1JO](https://gitee.com/openharmony/communication_dsoftbus/issues/IBI1JO?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] RecvMessageDeinit in Disc_ble.c is not locked, and no upper limit is set in disc_manager.c, which poses security risks.|
| [IBHTM4](https://gitee.com/openharmony/kernel_liteos_a/issues/IBHTM4?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-879883602844717056 |
| [IBFEJ7](https://gitee.com/openharmony/applications_app_samples/issues/IBFEJ7?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] Problematic axios 1.6.2 referenced|
| [IBFEWO](https://gitee.com/openharmony/applications_app_samples/issues/IBFEWO?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] Problematic body-parser 1.20.1 and 1.20.2 referenced|
| [IBFF0F](https://gitee.com/openharmony/applications_app_samples/issues/IBFF0F?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] Problematic braces (dev) 3.0.2 referenced|
| [IBGB67](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBGB67?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE patches incorporated |
| [IB8M92](https://gitee.com/openharmony/kernel_linux_5.10/issues/IB8M92?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-50256 in the Linux kernel component|
| [IB8L2B](https://gitee.com/openharmony/kernel_linux_5.10/issues/IB8L2B?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-38594 in the Linux kernel component|
| [IBE44O](https://gitee.com/openharmony/kernel_linux_5.10/issues/IBE44O?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE patches incorporated |
| [IBERYF](https://gitee.com/openharmony/kernel_liteos_a/issues/IBERYF?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-873354661225041920 |
| [IBEB48](https://gitee.com/openharmony/kernel_liteos_a/issues/IBEB48?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-872272903297568768 |
| [IBDWNM](https://gitee.com/openharmony/kernel_liteos_a/issues/IBDWNM?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-871586908591886336 |
| [IBJESO](https://gitee.com/openharmony/third_party_openssl/issues/IBJESO?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2024-13176 |
| [IBFN54](https://gitee.com/openharmony-sig/chromium_src/issues/IBFN54?from=project-issue) | [Vulnerability] [OpenHarmony-4.1-Release] CVE-2023-6112 |
## Known Issues
**Table 5** Known issues
| ISSUE | Description| Impact| To Be Resolved By|
| :------- | :------- | :------- | :------- |
| / | / | / | / |