1# RK322XH Release Note 2 3## rk322xh_ddr_{333,400}MHz_v1.21.bin 4 5| Date | File | Build commit | Severity | 6| ---------- | ---------------------------------- | ------------ | -------- | 7| 2024-11-26 | rk322xh_ddr_{333,400}MHz_v1.21.bin | 48fb7bc | moderate | 8 9### Fixed 10 11| Index | Severity | Update | Issue description | Issue source | 12| ----- | -------- | -------------------------------- | ----------------- | ------------ | 13| 1 | moderate | Modify the version print format. | - | - | 14 15------ 16 17## rk322xh_ddr_{333,400}MHz_v1.20.bin 18 19| Date | File | Build commit | Severity | 20| ---------- | ---------------------------------- | ------------ | -------- | 21| 2024-10-18 | rk322xh_ddr_{333,400}MHz_v1.20.bin | 4d28874 | moderate | 22 23### Fixed 24 25| Index | Severity | Update | Issue description | Issue source | 26| ----- | -------- | ------------------------------------------------------ | ------------------------------------------------------------ | ------------ | 27| 1 | moderate | Fix low probability DDR4 capacity detection anomalies. | Occasionally, there may be a mismatch in DDR4 capacity by 1/2 or 1/4 when the device is powered on or off. | - | 28 29------ 30 31## rk322xh_bl32_v2.02.bin 32 33| Date | File | Build commit | Severity | 34| ---------- | :--------------------- | ------------ | -------- | 35| 2023-08-14 | rk322xh_bl32_v2.02.bin | 44e25f04 | critical | 36 37### Fixed 38 39| Index | Severity | Update | Issue description | Issue source | 40| ----- | --------- | ----------------------------- | ------------------------------------------------------------ | ------------ | 41| 1 | critical | Fix security vulnerabilities. | Hackers can exploit vulnerabilities to attack OPTEE OS. | | 42| 2 | important | Fix memory leaks. | Customer calls TEE_ DerivekeyFromHard may experience memory leakage issues. | 374096 | 43 44------ 45 46